Abstract is missing.
- Are They Making Our Privates Public? - Emerging Risks of Governmental Open Data InitiativesThomas P. Keenan. 1-13 [doi]
- Top 10 Mistakes in System Design from a Privacy Perspective and Privacy Protection GoalsMarit Hansen. 14-31 [doi]
- Developing a Strategy for Automated Privacy Testing SuitesIoannis Agrafiotis, Sadie Creese, Michael Goldsmith. 32-44 [doi]
- Assessing Formal Independence of Data Protection Authorities in a Comparative PerspectivePhilip Schütz. 45-58 [doi]
- Extracting Access Control and Conflict Resolution Policies from European Data Protection LawKaniz Fatema, David W. Chadwick, Brendan Van Alsenoy. 59-72 [doi]
- Early Lessons Learned in the ENDORSE Project: Legal Challenges and Possibilities in Developing Data Protection Compliance SoftwareSandra Olislaegers. 73-87 [doi]
- The Infrastructure Level of Cloud Computing as a Basis for Privacy and Security of Software ServicesIna Schiering, Jan Kretschmer. 88-101 [doi]
- (More) Side Channels in Cloud Storage - Linking Data to UsersTobias Pulls. 102-115 [doi]
- Who Got All of My Personal Data? Enabling Users to Monitor the Proliferation of Shared Personally Identifiable InformationSebastian Labitzke. 116-129 [doi]
- Exploring Touch-Screen Biometrics for User Identification on Smart PhonesJulio Angulo, Erik Wästlund. 130-143 [doi]
- Using a Smartphone to Access Personalized Web Services on a WorkstationFaysal Boukayoua, Jan Vossaert, Bart De Decker, Vincent Naessens. 144-156 [doi]
- Designing Privacy-Enhancing Mobile ApplicationsKoen Decroix, Bart De Decker, Vincent Naessens. 157-170 [doi]
- Extending Comparison Shopping Sites by Privacy Information on RetailersUlrich König, Marit Hansen. 171-186 [doi]
- Do-Not-Track Techniques for Browsers and Their Implications for ConsumersMartin Beck, Michael Marhöfer. 187-196 [doi]
- P2P Social Networks with Broadcast Encryption Protected PrivacyOleksandr Bodriagov, Sonja Buchegger. 197-206 [doi]
- Privacy by Design: Does It Matter for Social Networks?Mohammad Badiul Islam, Renato Iannella. 207-220 [doi]
- Privacy Preserving Mechanisms for a Pervasive eHealth SystemMilica Milutinovic, Koen Decroix, Vincent Naessens, Bart De Decker. 221-231 [doi]
- Formalising Requirements for a Biobank Case Study Using a Logic for Consent and RevocationIoannis Agrafiotis, Sadie Creese, Michael Goldsmith. 232-244 [doi]
- Privacy Protection Goals and Their Implications for eID SystemsHarald Zwingelberg, Marit Hansen. 245-260 [doi]
- Avoiding Man-in-the-Middle Attacks When Verifying Public TerminalsGergely Alpár, Jaap-Henk Hoepman. 261-273 [doi]
- Massive Data Collection by Mistake?Arnold Roosendaal. 274-282 [doi]
- Addressing Governance and Ethics in European Technology Development Projects through ScenariosAygen Kurt, Penny Duquenoy. 283-292 [doi]