Home | Previous Summer Schools: 2003 | 2007 | 2008 | 2009

Accepted Workshop Papers

Further workshop papers are still under re-review and may be added later

Accepted PrimeLife workshop papers include the following ones:

1. Peter Rothenpieler, Claudia Becker and Stefan Fischer. Remote monitoring, social network and marketplace platform for AAL services

2. Harald Zwingelberg. Assessing the necessity for collecting personal data from the new German eID card

3. Jan Vossaert, Pieter Verhaeghe, Bart De Decker and Vincent Naessens. A smart card based solution for user-centric identity management

4. Ebenezer Paintsil and Lothar Fritsch. Survey of Privacy and Security in Identity Management Systems

5. Ulrich König. "Primelife Checkout" - a Privacy enabling user interface.

6. Periambal L. Coopamootoo and Debi Ashenden. Designing usable online privacy mechanisms: What can we learn from real world behaviour?

7. Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Nikolaos Papanikolaou, Marco Casassa Mont and Siani Pearson. Defining Consent and Revocation Policies

8. Marco Casassa Mont, Siani Pearson, Sadie Creese, Michael Goldsmith and Nikolaos Papanikolaou. EnCoRe: Towards A Conceptual Model For Privacy Policies

9. Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith and Nikolaos Papanikolaou. Applying formal methods to describe privacy control requirements in real case scenario: Emerging ambiguities and proposed solutions

10. Michael Marhoefer and Gökhan Bal. Controlling the Flow of PII to Web 2.0 beyond current Identity Service Provisioning

11. Lisa Rajbhandari and Einar Arthur Snekkenes. Using Game Theory to analyze Risk to Privacy

12. Anna Vapen and Nahid Shahmehri. Security Levels for Web Authentication using Mobile Phones

13. Azzedine Benameur and Siani Pearson. Decision Support for Design for Privacy: A System Focused on Privacy by Policy

14. Kaniz Fatema, David Chadwick and Stijn Lievens. A Privacy Policy Enforcement System

15. Leif-Erik Holtz. Descriptive privacy policies: Displaying privacy information with icons - Enhancing people's privacy awareness in social networking sites

16. Joseph Adjei. Identity Management in Developing Countries: The e-zwich Project in Ghana

17. Norberto Andrade. The Right to Privacy and the Right to Identity in the Age of Ubiquitous Computing: Friends or Foes? A Proposal Towards a Legal Articulation

18. Christian Weber. EScience and Shared Workspaces: Enabler for next generation research environment

19. Aleksandra Kuczerawy. Privacy settings in Social Networking Sites: is it fair?

20. Manuela Berg and Katrin Borcea-Pfitzmann. Implementability of the Identity Management Part in Pfitzmann/Hansen's Terminology for a Complex Digital World

21. Ton van Deursen. 50 ways to break RFID privacy

22. Stefan Strauß. The limits of control - emerging privacy challenges for (governmental) identity management

23. Matthias Pocs. Anonymous biometrics? - Privacy concerns in systems using biometric encryption and other approaches of template protection

24. Ina Schiering. Cloud Computing - Starting Points for Privacy and Transparency

25. Philip Schuetz and Michael Friedewald. What are we actually talking about? - A multidisciplinary approach to privacy (and data protection)

26. Sebastian Haas, Ralph Herkenhöhner and Denis Royer. Supporting semi-automated compliance control by a system design based on the concept of separation of concerns

27. Thomas Keenan. Oops - We Didn't Mean to Do That! How Unintended Consequences Can Hijack Good Privacy and Security Policies

28. Stefan Berthold. Towards Formal Languages for Privacy Options

Accepted ETICA workshop papers are:

1. Michael Dowd. Contextualised concerns: The online privacy attitudes of young adults

2. Anna Myroliubenko. Information Ethics and Ukrainian reality

3. Laureene Reeves Ndagire. Exploring technologies within mobility and identity management

4. Catherine Flick and Philippe Goujon. Introducing ethical reflexivity to technology governance: from theory to practice