Abstract is missing.
- est - A Lightweight Infrastructure for Global Heterogeneous Trust ManagementBud P. Bruegger, Peter Lipp. 15-26
- FutureTrust - Future Trust Services for Trustworthy Global TransactionsDetlef Hühnlein, Tilman Frosch, Jörg Schwenk, Carl-Markus Piswanger, Marc Sel, Tina Hühnlein, Tobias Wich, Daniel Nemmert, René Lottes, Juraj Somorovsky, Vladislav Mladenov, Cristina Condovici, Herbert Leitold, Sophie Stalla-Bourdillon, Niko Tsakalakis, Jan Eichholz, Frank-Michael Kamm, Andreas Kühne, Damian Wabisch, Roger Dean, Jon Shamah, Mikheil Kapanadze, Nuno Ponte, Jose Martins, Renato Portela, Cagatay Karabat, Snezana Stojicic, Slobodan Nedeljkovic, Vincent Bouckaert, Alexandre Defays, Bruce Anderson, Michael Jonas, Christina Hermanns, Thomas Schubert, Dirk Wegener, Alexander Sazonov. 27-41
- One mobile ID to secure physical and digital identityOliver Terbu, Stefan Vogl, Sebastian Zehetbauer. 43-54
- Towards a Decentralized Identity Management Ecosystem for Europe and BeyondBud P. Bruegger, Heiko Roßnagel. 55-66
- Architecture for Controlled Credential issuance Enhanced with Single Sign-On (ACCESSO)Daniel Nemmert, Detlef Hühnlein, Tobias Wich, Tina Hühnlein. 67-79
- Public Online Services at the Age of MyData: a New Approach to Personal Data Management in FinlandTeemu Rissanen. 81-92
- An eID mechanism built along Privacy by Design principles using secure elements, pseudonyms and attributesDenis Pinkas. 93-104
- Non-technical Challenges of Building Ecosystems for Trustable Smart Assistants in the Internet of Things: A Socioeconomic and Legal PerspectiveMichael Kubach, Caterina Görwitz, Gerrit Hornung. 105-116
- Risk-centred role engineering within identity data audits - Continuous improvement of the rights structure and possible risk accumulationsSebastian Kurowski. 117-133
- Password Policy Markup LanguageMoritz Horsch, Mario Schlipf, Stefan Haas, Johannes Braun 0001, Johannes A. Buchmann. 135-147
- Ethical Data Handling - beyond risk and complianceRobin Wilton. 151-152
- An interdisciplinary approach to develop secure, usable and economically successful softwareJanina Hofer, Rachelle Sellung. 153-158
- Challenging eID & eIDAS at University ManagementHermann Strack, Sandro Wefel. 159-165
- What's in a name: the conflicting views of pseudonymisation under eIDAS and the General Data Protection RegulationNiko Tsakalakis, Sophie Stalla-Bourdillon, Kieron O'Hara. 167-174
- Identity Mining vs Identity Discovering: a new approachCostantina Caruso, Andrea Dimitri, Massimo Mecella. 175-180
- Aligning ABAC Policies with Information Security Policies using Controlled VocabularyRaik Kuhlisch, Sören Bittins. 181-191