Articles PDFPrintE-mail

 

Title

Author(s)

Date

  Enforcing Confidentiality and Data Visibilty Constraints: An OBDD Approach“, Proceedings of the 25th Annual WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2011), Richmond, USA, July 11-13th, 2011
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati
 
July 2011
“Privacy-respecting Reputation for Wiki Users”, IFIP Trust Management, Copenhagen, Denmark, June 29-July 1, 2011

B.Kellermann, S. Pötzsch, S. Steinbrecher July 2011
Efficient and Private Access to Outsourced Data“, Proceedings of the 31st International Conference on Distributed Computer Systems (ICDS 2011), Minneapolis, USA, June 20-24th, 2011 S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, P. Samarati June 2011
Abstract Privacy Policy Framework: Addressing Privacy Problems in SOA“, in proceedings of iNetSec 2011, June 2011 L. Bussard, U. Pinsdorf June 2011

“Privacy and Identity Management for Life”, Proceedings of the 6th IFIP/PrimeLife International Summer School, Helsingborg, August 1-6, 2010, revised selected papers, published by Springer in May 2011

Simone Fischer-Hübner, Penny Duquenoy, Marit Hansen, Ronald Leenes, Ge Zhang

May 2011
“The Uncanny Valley Everywhere? On Privacy Perception and Expectation Management”, Proceedings of the 6th IFIP/PrimeLife International Summer School, Helsingborg, August 1-6, 2010, revised selected papers, published by Springer in May 2011 B. van den Berg May 2011
“Implementability of the Identity Management Part in Pfitzmann/Hansen’s Terminology for a Complex Digital World”, Proceedings of the 6th IFIP/PrimeLife International Summer School, Helsingborg, August 1-6, 2010, Springer, 2011 M. Berg, K. Borcea-Pfitzmann May 2011
“Towards a Formal Language for Privacy Options” in: “Privacy and Identity Management for Life”, Proceedings of the 6th IFIP/PrimeLife International Summer School, Helsingborg, August 1-6, 2010, Springer, 2011
S. Berthold May 2011
“Privacy Settings in Social Networking Sites: Is It Fair?”, Proceedings of the 6th IFIP/PrimeLife International Summer School, Helsingborg, August 1-6, 2010, Springer, 2011 A. Kuczerawy, F. Coudert May 2011

“Privacy Effects of Web Bugs Amplified by Web 2.0”, Proceedings of the 6th IFIP/PrimeLife International Summer School, Helsingborg, August 1-6, 2010, Springer, 2011

J. Dobias May 2011
“PrimeLife Checkout – A Privacy-Enabling e-Shopping User Interface”, Proceedings of the 6th IFIP/PrimeLife International Summer School, Helsingborg, August 1-6, 2010, Springer, 2011

U. König May 2011
“Towards Displaying Privacy Information with Icons”, Proceedings of the 6th IFIP/PrimeLife International Summer School, Helsingborg, August 1-6, 2010, Springer, 2011 L.-E. Holtz, K. Nocun, M. Hansen: May 2011
“Necessary processing of personal data – The need-to-know principle and processing data from the new German identity card”, Proceedings of the 6th IFIP/PrimeLife International Summer School, Helsingborg, August 1-6, 2010, Springer, 2011 H. Zwingelberg May 2011
“A Data-Centric Approach for Privacy-Aware Business Process Enablement”, Enterprise Interoperability, Lecture Notes in Business Information Processing, Volume 76, Part 2, Part 5, 2011, pp. 191-203 S. Short, S. P. Kaluvuri April 2011
“Data Usage Control in the Future Internet Cloud”, Lecture Notes in Computer Science, Volume 6656, 2011, pp. 223-231 M. Bezzi, S. Trabelsi April 2011
Collective Exposure: Peer Effects in Voluntary Disclosure of Personal Data“, Financial Cryptography, St. Lucia, February 28 – March 4, 2011
R. Böhme, S. Pötzsch Mach 2011
Privacy, Accountability and Trust – Challenges and Opportunities“, chapter contribution in the named ENISA report, 2011 S. Fischer-Hübner February 2011

An Obfuscation-based Approach for Protecting Location Privacy“, in IEEE Transactions on Dependable and Secure Computing, January-February, 2011

 
C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati January 2011
“Requirements for Identity Management from the Perspective of Multilateral Interactions”, in J. Camenisch, R. Leenes, D. Sommer (Eds.): Privacy and Identity Management for Europe (PRIME), Lecture Notes in Computer Science, Vol. 6545, Chapter 22, p. 597-635, Springer, 2011 S. Pötzsch, K. Borcea-Pfitzmann, M. Hansen, K. Liesebach, S. Steinbrecher January 2011
“Commercial Data Privacy and Innovation in the Internet Economy: A Dynamic Policy Framework”, Response to Department of Commerce Green Paper, 2011 R. Wenning January 2011
Anonymization of Statistical Data“, IT – Information Technology, 2011 S. de Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati January 2011

Privacy 3.0 := Data Minimization + User Control + Contextual Integrity“, it – Information Technology 53/1 (2011), Oldenbourg Wissenschaftsverlag, pp. 34-40

 
K. Borcea-Pfitzmann, A. Pfitzmann, M. Berg January 2011
Minimizing Disclosure of Client Information in Credential-Based Interactions“, International Journal of Information Privacy, Security and Integrity (IJIPSI), 2011 C.A. Ardagna, S. De Capitani die Vimercati, S. Foresti, S. Paraboschi, P. Samarati 2011
“Grant Option”, Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 S. De Capitani di Vimercati, G. Livraga 2011
“Selective Data Outsourcing for Enforcing Privacy”, Journal of Computer Security, 2011 V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati 2011
“Discretionary Access Control Policies (DAC)”, Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 S. De Capitani di Vimercati 2011

“A Privacy-preserving ID-based Group Key Agreement Scheme applied in VPAN”, in SOFSEM 2011: 37th Conference on Current Trends in Theory and Practice of Informatics,Lecture Notes in Computer Science 6543, J. Hromkovič, and R. Královič (eds.), Springer, pp. 214-222, 2011
Y. De Mulder, K. Wouters, B. Preneel 2011
“Privileges in SQL”, Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 S. de Capitani di Vimercati, G. Livraga 2011
“Advances in Access Control Policies”, Privacy and Identity Management for Life, J. Camenisch, S. Fischer-Hübner, K. Ranneberg, Springer, 2011 C. Ardagna, S. De Capitani die Vimercati, G. Neven, S. Paraboschi, E. Pedrini, F.-S. Preiss, P. Samarati, M. Verdicchio 2011
“Data Privacy”, Privacy and Identity Management for Life, J. Camenisch, S. Fischer-Hübner, K. Rannenberg, Springer, 2011 M. Bezzi, S. De Capitani di Vimercati, S. Foresti, G. Livraga, S. Paraboschi, P. Samarati 2011
“Least Privilege”, Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 S. De Capitani di Vimercati 2011
“k-anonymity”, Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 P. Samarati 2011
Authorization Enforcement in Distributed Query Evaluation“, Journal of Computer Security, 2011 S. De Capitani di Vimercati, S. Foresti, S. Jajoda, S. Paraboschi, P. Samarati 2011
“Privacy-Aware Access Control Policies”, Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 S. De Capitani di Vimercati 2011
“Flexible Authorization Framework (FAF)”, Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 P. Samarati 2011
“SQL Access Control Model”, Encyclopdia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 S. De Capitani di Vimercati, G. Livraga 2011
“Implementability of the Identity Management Part in Pfitzmann/Hansen’s Terminology for a Complex Digital World”, Proceedings of PrimeLife/IFIP SummerSchool 2010 M. Berg, K. Borcea-Pfitzmann 2011
“Privacy-Aware Access Control System: Evaluation and Decision”, Digital Privacy: PRIME – Privacy and Identity Management for Europe, J. Camenisch, R. Leenes, D. Sommer, Springer, 2011 C.A. Ardagna, S. De Capitani di Vimercati, E. Pedrini, P. Samarati 2011
“Clark and Wilson”, Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 S. De Capitani di Vimercati, P. Samarati 2011
“Multilevel Database”, Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 G. Livraga, P. Samarati 2011
“Policy Composition”, Encyclopdia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 S. De Capitani di Vimercati 2011
“Privacy Models and Languages: Access Control and Data Handling Policies”, Digital Privacy: PRIME – Privacy and Identity Management for Europe, J. Camenisch, R. Leenes, D. Sommer, Springer, 2011 C.A. Ardagna, S. De Capitani di Vimercati, P. Samarati 2011
“Chinese Wall”, Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 S. De Capitani di Vimercati, P. Samarati 2011
“Scramble! your social network data”, In Privacy Enhancing Technologies International Symposium, PETS 2011, Lecture Notes in Computer Science, Simone Fischer-Hübner, and N. J. Hopper (eds.), Springer-Verlag, 15 pages, 2011 F. Beato, M. Kohlweiss, K. Wouters 2011
“Mandatory Access Control Policies (MAC)”, Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 S. De Capitani di Vimercati, P. Samarati 2011
“Recursive Revoke”, Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 P. Samarati 2011
“Selective Exchange of Confidential Data in the Outsourcing Scenario”, Privacy and Identity Management for Life, J. Camenisch, S. Fischer-Hübner, K. Rannenberg, Springer, 2011 S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, P. Samarati 2011
Differentially Private Billing with Rebates“, in Information Hiding, International Workshop, IH 2011, Lecture Notes in Computer Science, Springer-Verlag, 21 pages, 2011

G. Danezis, M. Kohlweiss, A. Rial 2011
“Polyinstantiation”, Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 S. De Capitani die Vimercati, P. Samarati 2011
“Policy Requirements and State of the Art”, Privacy and Identity Management for Life, J. Camenisch, S. Fischer-Hübner, K. Rannenberg, Springer, 2011 C. Bournez, C.A. Ardagna 2011
“Authorizations”, Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 S. De Capitani di Vimercati 2011
“Location information (privacy of)”, Encyclopedia of Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 C.A. Ardagna 2011
“Privacy in Data Publishing”, Data Privacy Management and Autonomous Spontaneous Security, J. Gracia-Alfaro, G. Navarro-Arribas, A. Cavalli, J. Leneutre, Springer, 2011 S. De Capitani di Vimercati, S. Foresti, G. Livraga 2011
“XML-based access control languages”, Encyclopedia of Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 C.A. Ardagna 2011
“Quasi-identifier”, Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 S. De Capitani di Vimercati, S. Foresti 2011
“Privacy, Liveliness and Fairness for Reputation”, in Cerna et al. (Eds.): Proceedings of SOFSEM 2011, LNCS 6543, p. 506-519, Springer, 2011 S. Schiffner, S. Clauß, S. Steinbrecher 2011
“Personal Privacy in Mobile Networks”, Mobile Technologies for Conflict Management: Online Dispute Resolution, Governance, Participation, M. Problet, Law, Governance and Technology Series 2, Springer Science+Business Media B.V., 2011 C.A. Ardagna, S. De Capitani di Vimercati, P. Samarati 2011
“Access Matrix”, Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 S. De Capitani di Vimercati 2011
“Privacy-Enhanced Web-Based Event Scheduling with Majority Agreement”, Proceedings of IFIC-SEC 2011: Future Challenges in Security and Privacy for Academia and Industry B. Kellermann 2011
“Microdata Protection”, Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 S. Foresti 2011
“Administrative Policies”, Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 S. De Capitani di Vimercati, P. Samarati 2011
“Privacy Effects of Web Bugs Amplified by Web 2.0”, in S. Fischer-Hübner et al. (Eds.): Proceedings of Privacy and Identity 2010, IFIP AICT 352, p. 244-257, Springer, 2011 J. Dobias 2011
“Privacy-Aware Languages”, Encyclopedia of Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 C.A. Ardagna 2011
“Access Control Policies, Models, and Mechanisms”, Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia, Springer, 2011 S. De Capitani di Vimercati 2011
“Mixing Identities with Ease”, Proceedings of Policies and Reserach in Identity Management, IFIP Advances in Information and Communication Technology, Vol. 343, p. 1-17, 2010 P. Bichsel, J. Camenisch November 2010
“Privacy in personal applications”, Proceedings of SENSYBLE/ITG/GI Workshop 2010 K. Rannenberg November 2010
“Usable Security and Privacy”, Datenschutz und Datensicherheit (DuD) 11/2010 S. Fischer-Hübner, L. L. Iocano, S. Möller November 2010
“Geolokalisierung und Geotracking – Herausforderungen für Location Privacy”, in DANA Datenschutz Nachrichten 3/2010, p. 100-105, 2010 M. Hansen October 2010
Privacy Awareness Information for Web Forums: Results from an Empirical Study“, Proceedings of 6th Nordic Conference on Human Computer Interaction: Extending Boundaries (NORDiCHI’10), p. 363-372, ACM, 2010 S. Pötzsch, P. Wolkerstorfer, C. Graf October 2010
“Towards future-proof privacy-respecting identity management systems”, in Proceedings of N. Pohlmann, H. Reimer, W. Schneider (eds.): ISSE 2010 – Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, p. 182-190, 2010 M. Hansen October 2010
“PPL Engine: A Symmetric Architecture for Privacy Policy Handling”, Position Paper and article in Proceedings of W3C Workshop on Privacy and data usage control, 2010 S. Trabelsi, A. Njeh, L. Bussard, G. Neven October 2010
“Social Lending aus der Perspektive des Datenschutzes”, Proceedings of SICHERHEIT 2010 – Sicherheit, Schutz und Zuverlässigkeit, LNI 170, p. 317-328, Köllen, 2010 R. Böhme, S. Pötzsch October 2010
“Data Handling: Dependencies between Authorizations and Obligations”, Position Paper at W3C Workshop on Privacy and data usage control, 2010 L. Bussard, G. Neven, J. Schallaböck October 2010
“Get Shorty via Group Signatures without Encryption”, Proceedings of Security and Cryptography for Networks, p. 318-396, Springer LNCS, Vol. 6280, 2010 P. Bichsel, J. Camenisch, G. Neven, N.P. Smart, B. Warinschi September 2010
“Einfluss wahrgenommener Privatsphäre und Anonymität auf Forennutzer”, in U. Schroeder Ulrik (Ed.): Interaktive Kulturen, Berlin, 2010 S. Pötzsch September 2010

“Analyzing Causes of Privacy Mismatches in Service Oriented Architecture”, Master thesis Rheinisch-Westfälische Technische Hochschule European Microsoft Innovation Center Aachen, Germany

Sharif Tanvir Rahman

September 2010

Protecting Privacy of Sensitive Value Distributions in Data Release“, Proceedings of the 6th Workshop on Security and Trust Management (STM 2010) M. Bezzi, S. De Capitani di Vimercati, G. Livraga, P. Samarati September 2010
“Surveillance and Privacy”, What kind of Information Society? Governance, Virtuality, Surveillance, Substainability, Resilience – Proceedings of the IFIP TC9 International Conference HCC9 2010, Springer, 2010 Y. Giorgiadou, S. Fischer-Hübner September 2010
“The Role of Soft Information in Trust Building: Evidence from Online Social Lending”, in A. Aquisti, S.W. Smith (Eds.): Trust 2010, LNCS 6101, p. 381-395, Springer, 2010 S. Pötzsch, R. Böhme August 2010
“Towards an Economic Valuation of Telco-based Identity Management Enablers”, Proceedings of PrimeLife/IFIP SummerSchool 2010 K. Rannenberg August 2010
“Controlling the Flow of PII to Web 2.0 beyond current Identity Service Provisioning”, Proceedings of PrimeLife/IFIP SummerSchool 2010 M. Marhoefer, G. Bal August 2010
“eScience and Shared Workspaces: Enabler for next generation research environment”, Proceedings of PrimeLife/IFIP SummerSchool 2010 C. Weber August 2010
“W3C Geolocation API calls for Better User Privacy Protection”, Proceedings of W3C Workshop on Privacy for Advanced Web APIs I. Krontiris, A. Albers, K. Rannenberg July 2010
“Privacy in mobile applications and beyond”, Proceedings of Journée ADREAM, Architectures dynamiques reconfigurables pour systèmes embarqués autonomes mobiles, LAAS CNRS K. Rannenberg July 2010
Downstream Usage Control“, in proceedings of IEEE Policy 2010, July 2010 (download) L. Bussard, G. Neven, F.-S- Preis July 2010
“Datenschutzkonformes Social Networking: Clique und Scramble!”, in: Datenschutz und Datensicherheit 34 (2010) 7, pp. 439-443 L.-E. Holtz July 2010
“Delegation for Privacy Management from Womb to Tomb – A European Perspective”, in M. Bezzi, P. Duquenoy, S. Fischer-Hübner, M. Hansen, G. Zhang (Eds.): Privacy and Identity Management for Life, Proceedings of the 5th IFIP WG 9.2,9.6/11.4, 11.6, 11.7/PrimeLife International Summer School 2009, IFIP AICT 320, p. 18-33, Springer, 2010 M. Hansen, M. Raguse, K. Storf, H. Zwingelberg June 2010
The Role of Soft Information in Trust Building: Evidence from Online Social Lending“, in A. Acquisti, S.W. Smith, and A.-R. Sadeghi (eds.), Proceedings of TRUST 2010, LNCS 6101, pp. 381-395, Springer, 2010
S. Pötzsch, R. Böhme June 2010
“Spuren im Netz – der Schutz der Privatspähre”, in: D. Korczak (ed.): Spurensuche – Kulturwissenschaftliche Interpretationen und gesellschaftliche Rezeption, Proceedings und Tagungsband zur 66. Jahrestagung, p. 105-128, 2010 M. Hansen June 2010
“Privacy-Aware Policy Matching”, Proceedings of IEEE Symposium on Computers and Communications 2010, 2010 S. Trabelsi, E. Weil, A. Sorniotti, S. Short, M. Bezzi June 2010

“Lebenslanger Datenschutz – Anforderungen an vertrauenswürdige Infrastrukturen”, in: Datenschutz und Datensicherheit (DuD) 34 (2010) 5, pp. 283-288.

Marit Hansen, Sven Thomsen May 2010
“A Formal Model of Identity Mixer”, Lecture Notes in Computer Science, Volume 6371/2010, p. 198-214, 2010 Jan Camenisch, Sebastian Mödersheim and Dieter Sommer 2010
A terminology for talking about privacy by data minimiztion: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonimity, and Identity Management“, Working paper v0.33, 2010 A. Pfitzmann, M. Hansen April 2010
“Role management in a privacy-enhanced collaborative environment”, in P. Kommers, P. Isarias (Eds.): Proceedings of e-Society, IADIS, 2010 A. Lorenz, K. Borcea-Pfitzmann March 2010

“Technik für mehr Transparenz”; in: digma – Zeitschrift für Datenrecht und Informationssicherheit 1/2010, Schulthess 2010

Simone Fischer-Hübner, Marit Hansen, Hans Hedbom March 2010
“Privacy in Online Social Lending”, Proceedings of the AAAI 2010 Spring Symposium on Intelligent Information Privacy Management, p. 23-28 R. Böhme, S. Pötzsch March 2010
“Get Shorty via Group Signatures without Encryption”, Lecture Notes in Computer Science, Volume 6280/2010, p. 381-398, 2010
Patrik Bichsel, Jan Camenisch, Gregory Neven, Nigel P. Smart and Bogdan Warinschi 2010
“Context is everything: sociality in Online Social Network Sites”, Proceedings of Privacy and Identity, IFIP AICT 320, p. 48-65, Springer, 2010 R. Leenes 2010
“Privacy and Liveliness for reputation Systems”, Lecture Notes in Computer Science 2010, Vol. 6391/2010, p. 209-224, Springer, 2010 S. Schiffner, S. Clauß, S. Steinbrecher 2010
“Privacy-Enhancing Cryptography: From Theory into Practice”, Lecture Notes in Computer Science Notes,Volume 5978/2010, p.498, 2010 Jan Camenisch
2010
“Audience segregation in social network sites”, Proceedings for SocialCom2010/PASSAT2010, p. 1111-1117, Washington, USA, 2010 B. van den Berg, R. Leenes 2010
Downstream Usage Control”, Proceedings of IEEE Policy 2010 L. Bussard, G. Neven, F.-S. Preiss 2010
Privacy and Identity Management for Life“, Proceedings of the 5th IFIP/PrimeLife SummerSchool 2009, Springer, 2010 M. Bezzi, P. Duquenoy, S. Fischer-Hübner, M. Hansen, G. Zhang 2010
“Solving Revocation with Efficient Update of Anonymous Credentials”, Lecture Notes in Computer Science,Volume 6280/2010, p. 454-471, 2010 Jan Camenisch, Markulf Kohlweiss and Claudio Soriente 2010
“Lifelong Privacy: Privacy and Identity Management for Life”, Proceedings of M. Bezzi, P. Duquenoy, S. Fischer-Hübner, M. Hansen, G. Zhang (Eds.:): Privacy and Identity Management for Life, IFIP Advances in Information and Communication Technology, Vol. 320, Springer, 2010 A. Pfitzmann, K. Borcea-Pfitzmann 2010
“Policies and Research in Identity Management”, Proceedings of the 2nd IFIP WG11.6 working conference IDMAN 2010, Oslo, Norway, Springer, 2010 E. de Leeuw, S. Fischer-Hübner, L. Fritsch 2010
“Efficiency Limitations for Σ-Protocols for Group Homomorphisms”, Lecture Notes in Computer Science, Volume 5978/2010, p. 553-571, 2010 Endre Bangerter, Jan Camenisch and Stephan Krenn 2010
“JCS special issue on EU-funded ICT research on Trust and Security”, Journal of Computer Security, 2010
Jan Camenisch, Javier Lopez, Fabio Massacci, Massimo Ciscato, Thomas Skordas 2010
“The Conflict between Privacy and Digital Forensics”, Wirtschafts- und Finanzstrafrecht in der Praxis, Bd. 4 – 2010, Linde, 2010 S. Fischer-Hübner 2010
“Efficiency Limitations for Σ-Protocols for Group Homomorphisms”, Proceedings of TCC 2010, p. 553-571 E. Bangerter, J. Camenisch, S. Krenn 2010
“Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project”, Journal of Computer Security, Volume 18, Number 1, p. 123-160, 2010 Claudio A. Ardagna, Jan Camenisch, Markulf Kohlweiss, Ronald Leenes, Gregory Neven, Bart Priem, Pierangela Samarati, Dieter Sommer, Mario Verdicchio 2010
“Cryptographic Protocols For Privacy Enhanced Identity Management”, PhD thesis, B. Preneel (promoter), 2010
M. Kohlweiss 2010
“Credential Authenticated Identification and key Exchange”, Proceedings of CRYPTO 2010, p. 255-276 J. Camenisch, N. Casati, T. Groß, V. Shoup 2010
“Robust Encryption” Lecture Notes in Computer Science, 2010, Volume 5978/2010, p. 480-497, TCC, 2010
Michel Abdalla, Mihir Bellare, Gregory Neven 2010
Privacy-Preserving Credential-Based Access Control and How to enable it with XACML and SAML,Proceedings of IEEE International Symposium on trust, Security and Privacy for Emerging Applications 2010 (TSP-10), 2010 C.A. Ardagna, S. De Capitani di Vimercati, G. Neven, S. Paraboschi, F.-S. Preiss, P. Samarati, M. Verdicchio 2010
“Performance Analysis of Accumulator-based Revocation Mechanisms”, Proceedings of the 25th International Conference on Information Security (SEC 2010), IFIP Conference Proceedings, Kluwer, 2010 J. Lapon, M. Kohlweiss, B. De Decker, V. Naessens 2010
“Unlinkable priced oblivious transfer with rechargable wallets”, R. Sion (Ed.): Proceedings of 14th International Conference on Financial Cryptography and Data Security – FC 2010, Vol. 6052 of Lecture Notes in Computer Science, p. 66-81, Springer, 2010 J. Camenisch, M. Dubovitskaya, G. Neven 2010
“Privacy-Respecting Access Control in Collaborative Workspaces”, IFIP Advances in Information and Communication Technology, Volume 320/2010, p. 102-111, 2010

Stefanie Pötzsch, Katrin Borcea-Pfitzmann

2010
“Encrypting Keys Securely”, Proceedings of IEEE Security & Privacy 8 (4), p. 66-69, 2010 C. Cachin, J. Camenisch 2010
“Enabling privacy-preserving credential-based access control with XACML and SAML”, Proceedings of 10th International Conference on Computer and Information Technology – CIT 2010, p. 1090-1095, IEE Computer Society, 2010 C.A. Ardagna, S. De Capitani die Vimercati, G. Neven, S. Paraboschi, F.-S. Preiss, P. Samarati, M. Verdicchio 2010
“Credential Authenticated Identification and Key Exchange”, Lecture Notes in Computer Science, 2010
Jan Camenisch, Nathalie Casati, Thomas Gross and Victor Shoup
2010
“A Pattern Collection for Privacy Enhanced Technology”, 2010 C. Graf, P. Wolkerstorfer, A. Geven, M. Tscheligi 2010
“A Card Requirements Language Enabling Privacy-Preserving Access Control”, Proceedings of the 15th ACM Symposium on Access Control Models and Technologies “SACMAT 2010”, p. 119-128, 2010 J. Camenisch, S. Moedersheim, G. Neven, F.-S. Preiss, D. Sommer 2010

“Identitätsmanagement in Netzwelten”, in: Dieter Klumpp, Herbert Kubicek, Alexander Roßnagel, Wolfgang Schulz (Hg.): Netzwelt – Wege, Werte, Wandel; Springer, Berlin Heidelberg 2010, 245–263.

Sandra Steinbecher, Andreas Pfitzmann, Sebastian Clauß


January 2010
“Usable Privacy-Enhancing Identity Management: Challenges and Approaches“, in: Information and Communication Technologies, Society and Human Beings: Theory and Framework. Honouring Professor Gunilla Bradley, IGI Global, 2010
Simone Fischer-Huebner, John Sören Pettersson
2010
“Saving online privacy”, M. Bezzi, P. Duquoenoy, S. Fischer-Hübner, M. Hansen, G. Zhang (eds.): Proceedings of Privacy and Identity Management for Life, Vol. 320 of IFIP Advaces in Information and Communication Technology, p. 34-47, Springer, 2010
J. Camenisch, G. Neven 2010
“Fine-grained disclosure of access policies”, M. Soriano, S. Qing, J. Lopez (eds.): Proceedings of 12th International Conference on Information and Communications Security – ICICS 2010, Vol. 6476 of Lecture Notes in Computer Science, p. 16-30, Springer, 2010 C.A. Ardagna, S. De Capitani di Vimercati, S. Foresti, G. Neven, S. Paraboschi, F.-S. Preiss, P. Samarati, M. Verdicchio 2010
“An XACML-based privacy-centered access control system”, in proceedings of the 1st ACM Workshop on Information Security Governance (WISG 2009), Chicago, IL, USA. C. A. Ardagna, S. De Capitani di Vimercati, S. Paraboschi, E. Pedrini, P. Samarati November 2009

“SpotAFriendNow: Social interaction through location-based social networks”, in Information, Communication and Society Bibi van den Berg, M.E. Pekárek 18.11.2009

“Anonymous credentials on a standard java card”, in Proceedings of the 2009 ACM Conference on Computer and Communications Security, p. 600-610, ACM Press, 2009 Patrik Bichsel, Jan Camenisch, Thomas Gross, Victor Shoup: 13.11.2009

“A Netiquette for Social Networks“, Joint presentation at Re-Publica 2009 and 2nd European Privacy Open Space, 2009
Jan Schallaböck 2009

“Privacy on Mobile Devices: Present and Future Technologies”, at ETSI Security Workshop in Sophia-Antipolis, France Stephan Spitz 2009

“Credential-based access control extensions to XACML”, presentation at PrimeLife & W3C Workshop on Access Control Application Scenarios, Abbaye de Neumünster, Luxemburg Jan Camenisch, Sebastian Mödersheim, Gregory Neven, Franz-Stefan Preiss, Dieter Sommer 2009
“Internet of Things – Strategic Roadmap”, 43p, IoT Cluster of European Research Projects, 15 September 2009 P. Guillemin, P. Friess, O. Vermesan, M. Harrison, H. Vogt, K. Konstantinos, M. Tomasella, S. Gusmeroli, K. Wouters, S. Haller September 2009
“Private Intersection of Certified Sets”, in Proceedings of Financial Cryptography, p. 108-127, Springer LNCS, 2009 Jan Camenisch and Gregory M. Zaverucha 2009
“Exploring Trust, Security and Privacy in Digital Business”, Inauguration edition of the Journal: “Transactions on Large Scale Data and Knowledge Centered Systems” , Vol.1, No.1, published by Springer Verlag within the LNCS journal subline 5729, September 2009 Simone Fischer-Hübner, Steven Furnell, Costas Lambrinoudakis September 2009

“Privacy-Respecting Access Control in Collaborative Workspaces”, published in Pre-Proceedings of Fifth IFIP/PrimeLife, Summer School, Nice, France, 2009 Stefanie Pötzsch and Katrin Borcea-Pfitzmann September 2009

“Putting Privacy Pictograms into Practice – A European Perspective”, in Stefan Fischer, Erik Maehle, Rüdiger Reischuk (eds.): “INFORMATIK 2009 – Im Focus das Leben”; LNI P-154, Gesellschaft für Informatik, Bonn 2009 Marit Hansen 21.09.2009

“Keep a Few: Outsourcing Data While Maintaining Confidentiality”, in proceedings of the 14th European Symposium On Research
In Computer Security (ESORICS 2009), Saint Malo, France
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati 21.09.2009

“Anonymous Credentials in Web Applications – A Child’s Play with the PRIME Core”, published in Pre-Proceedings of Fifth IFIP/PrimeLife Summer School, Nice, France, 2009 Benjamin Kellermann and Immanuel Scholz 07.09.2009 – 11.09.2009

“Digital Personae and Profiles as Representations of Individuals”, published in Pre-Proceedings of Fifth IFIP/PrimeLife Summer School, Nice, France, 2009 Arnold Roosendaal 07.09.2009 – 11.09.2009

“PET-USES: The Privacy Enhancing Technology Users’ Self-Estimation Scale”, published in Pre-Proceedings of Fifth IFIP/PrimeLife Summer School, Nice, France, 2009. Erik Wästlund, Peter Wolkerstorfer 07.09.2009 – 11.09.2009

“Facebook and its EU Users – Applicability of the EU Data Protection Law to US Based SNS” published in Pre-Proceedings of Fifth IFIP/PrimeLife Summer School, Nice, France, 2009. Aleksandra Kuczerawy 07.09.2009 – 11.09.2009

“Adding Secure Transparency Logging to the Prime Core”, published in Pre-Proceedings of Fifth IFIP/PrimeLife Summer School, Nice, France, 2009 Hans Hedbom, Tobias Pulls, Peter Hjärtquist and Andreas Lavén 07.09.2009 – 11.09.2009

“Addressing the Privacy Paradox by Expanded Privacy Awareness – The Example of Context-Aware Services”, published in Pre-Proceedings of Fifth IFIP/PrimeLife Summer School, Nice, France, 2009. Andre Deuker 07.09.2009 – 11.09.2009

“Privacy from Womb to Tomb – Delegation from a European Perspective” published in Pre-Proceedings of Fifth IFIP/PrimeLife Summer School, Nice, France, 2009
Marit Hansen, Maren Raguse, Katalin Storf, Harald Zwingelberg 07.09.2009 – 11.09.2009
“Privacy-enhanced event scheduling”, at IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT ’09), 3:52 59, 2009. Benjamin Kellermann, Rainer Bohme 29.08.2009

“Universally composable adaptive priced oblivious transfer”.
In: Pairing-Based Cryptography – Pairing 2009, Lecture Notes in Computer Science, page 24, Palo Alto,CA,USA, Springer, 2009
A. Rial, M. Kohlweiss, B. Preneel 12.08.- 14.08.2009

“Compact e-cash and simulatable vrfs revisited”, in: Pairing-Based Cryptography – Pairing 2009, Lecture Notes in Computer Science, p. 27, Palo Alto,CA,USA, Springer, 2009 M. Belenkiy, M. Chase, M. Kohlweiss, A. Lysyanskaya 12.08.- 14.08.2009

“Protecting Information Privacy in the Electronic Society,” in International Conference on Security and Cryptography (SECRYPT 2009), Milan, Italy, July, 2009 Stefan Schiffner, Sebastian Clauß 07.07.2009

“Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients”, in Proc. of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security
(DBSec 2009), Montreal, Quebec, Canada, 2009
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Para-
boschi, and P. Samarati
July 2009

“A Survey on Tansparency Tools for Enhancing Privacy”, in: The Future of Identity in the Information Society, Proceedings of the 4th IFIP/FIDIS Summer School, Brno, September 2008. Published by Springer in 2009 Hans Hedbom 2009

“Privacy Awareness: A Means to Solve the Privacy Paradox?”, Volume 298 of IFIP Advances in Information and Communication Technology, pages 226 236., Springer, Boston, 2009 Stefanie Pötzsch July 2009

“Valuating Privacy with Option Pricing Theory”, Workshop on the Economics of Information Security, TU Dresden, (WEIS 2009) Stefan Berthold, Rainer Böhme June 2009
“Data fusion for user presence identification”, in IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA 2009), Hong Kong, 2009
V. Di Lecce, A. Amato, V. Piuri May – July 2009
“Proofs and Delegatable Anonymous Credentials”, in Proceedings of CRYPTO 2009, p. 108-125, Springer LNCS, 2009

Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Hovav Shacham

2009
“Privacy preserving electronic petitions”, in: Identity in the Information Society, 1(1):14, 2009 Claudia Diaz, Eleni Kosta, Hannelore Dekeyser, Markulf Kohlweiss, Girma Nigusse 2009
“Oblivious transfer with access control”, in E. Al-Shaer, S. Jha, and A. Keromytis, (eds.) Proceedings of the 2009 ACM Conference on Computer and Communications Security, pages 131-140. ACM Press, 2009 J. Camenisch, M. Dubovitskaya and G. Neven 2009
Remarks on “Analysis of one popular group signature scheme” in Asiacrypt 2006, in: IJACT, Volume 1, Number 4, p. 320-322, 2009    

 

Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik  

 

2009

An Obfuscation-Based Approach for Protecting Location Privacy“, in IEEE Transactions on Dependable and Secure Computing.

C. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati 2009

“Social networks and web 2.0: are users also bound by data protection regulations?” in Identity in the Information Society (IDIS), 2009, special issue on Social Web and Identity, DOI 10.1007/s12394-009-0017-3

B. Van Alsenoy, J. Ballet, A. Kuczerawy, J. Dumortier

2009
An Obligation Framework and Language for Data Handling in Service Composition“, in Master Thesis, Rheinisch-Westfälische Technische Hochschule Aachen, Germany Muhammad Ali 10.06.2009
Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases“, in Proc. of the 29th International Conference on Distributed Computing Systems (ICDCS 2009), Montreal, Quebec, Canada V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati 22.-26.06.2009
JASON: A Scalable Reputation System for the Semantic Web“, in Proc. of the 24th IFIP TC-11 International Information Security Conference (SEC 2009), Cyprus, Greece S. Steinbrecher, S. Groß, and M. Meichau 18.-20.05.2009
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios“, in Proc. of the 24th IFIP TC-11 International Information Security Conference (SEC 2009), Cyprus, Greece C. Blundo, S. Cimato, S. de Capitani di Vimercati, A. De Santis, S. Foresti, S. Paraboschi, and P. Samarati 18.-20.05.2009
An ontology-based approach to
human telepresence
,” in IEEE International Conference on Computational
Intelligence for Measurement Systems and Applications (CIMSA 2009),
Hong Kong, China, May 11-13, 2009.
V. Di Lecce, M. Calabrese, V. Piuri 11.-13.05.2009
Data Fusion for User Presence Identification,” IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA 2009), Hong Kong, China, May 11-13, 2009. V. Di Lecce, A. Amato, V. Piuri 11.-13.05.2009
On the Portability of Generalized Schnorr Proofs“, in Proc. of the 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2009), Cologne, Germany J. Camenisch, A. Kiayias, and M. Yung 26.4.-01.05.2009
“Using Linkability Information to Attack Mix-based Anonymity Services”, in: Proceedings of Privacy Enhancing Technologies 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009, LNCS 5672, Springer, Berlin/Heidelberg, p. 94-107, 2009 Stefan Schiffner, Sebastian Clauß May 2009

“A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks”, in: Proceedings of EUROCRYPT 2009, p. 351-368, Springer LNCS, 2009 Jan Camenisch, Nishanth Chandran, Victor Shoup 26.04. – 30.04.2009



“Datenschutzkontrolle durch Open Source” in:

Datenschutz und Datensicherheit, DUD, Volume 3, Number 3

Jan Schallaböck March 2009



An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials“, in Proc. of the 12th International Conference on Practice and Theory in Public Key Cryptography (PKC 2009), Irvine, USA J. Camenisch, M. Kohlweiss, and C. Soriente 18.-20.03.2009
Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data”, in Proc. of the 12th International Conference on Practice and Theory in Public Key Cryptography (PKC 2009), Irvine, USA J. Camenisch, M. Kohlweiss, A. Rial, and C. Sheedy 18.-20.03.2009
“Cryptographic Protocols of the Identity Mixer Library, v. 1.0”, in IBM Research Report RZ3730 P. Bichsel, C. Binding, J. Camenisch, T. Groß, T. Heydt-Benjamin, D. Sommer, and G. Zaverucha 19.03.2009
User-centric Identity Management as an indispensable tool for privacy protection“, in: International Journal of Intellectual Property Management, Vol.2, No. 4, 2009, pp. 345 – 371 R. Leenes January 2009
User-controlled Identity Management: The Key to the future of Privacy?“, in: International Journal of Intellectual Property Management, Vol.2, No. 4, 2009, pp. 325 – 244 M. Hansen January 2009
“Data Retention and Anonymity Services – Introducing a New Class of Realistic Adversary Models”, in P. Svenda (Editor), The Future of Identity in the Information Society – Challenges for Privacy and Security, 2009
S. Berthold, R. Böhme, and S. Köpsell 2009
“Rethinking accountable privacy supporting services”, in Identity in the Information Society (IDIS), 2009 J. Camenisch, T. Groß, and T. S. Scott-Heydt Benjamin 2009
“A Comparison of Privacy Issues in Collaborative Workspaces And Social Networks”, in Identity in the Information Society (IDIS), 2009, special issue on Social Web and Identity M. Pekarek, and S. Poetzsch 2009
Privacy Preservation over Untrusted Mobile Networks“, in Privacy in Location Based Applications, Springer, 2009 C.A. Ardagna, S. Jajodia, P. Samarati, and A. Stavrou
2009
Access Control in Location-Based Services“, in Privacy in Location Based Applications, C. Bettini, S. Jajodia, P. Samarati, and S. Wang (Eds.), Springer, 2009 C. A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, and P. Samarati 2009
Exploiting Cryptography for Privacy-Enhanced Access Control: A result of the PRIME Project“, in: Journal of Computer Security (JCS), 2009 C.A. Ardagna, J. Camenisch, M. Kohlweiss, R. Leenes, G. Neven, B. Priem, P. Samarati, D. Sommer, and M. Verdicchio 2009
Net Privacy“, in Computer and Information Security Handbook, Morgan Kaufmann, 2009 C.A. Ardagna, C. Braghin, and M. Cremonini 2009
Privacy-aware Biometrics: Design and Implementation of a Multimodal Verification System,” in Proc of the Annual Computer Security Applications Conference (ACSAC24), Anaheim, California, USA S. Cimato, M. Gamassi, V. Piuri, R. Sassi, F. Scotti 08.-12.12.2008
“Rethinking accountable privacy supporting services“, in: Proceedings of the 4th ACM workshop on digital identity management, Alexandria, Virginia, USA, 99. 1- 8 J. Camenisch, T. Groß and T.S. Heydt-Benjamin 31.10.2008
Efficient Attributes for anonymous credentials“, in: Proc. of the 15th ACM Conference Conference on Computer and Communications Security (CCS 2008), Alexandria, Virginia, USA, pp. 345 – 356 J. Camenisch and T. Groß 27.-31.10.2008
Assessing Query Privileges via Safe and Efficient Permission Composition“, in: Proc. of the 15th ACM Conference Conference on Computer and Communications Security (CCS 2008), Alexandria, Virginia, USA S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati 27.-31.10.2008
Preserving Confidentiality of Security Policies in Data Outsourcing” in Proc. of the Workshop on Privacy in the Electronic Society (WPES’08), Alexandria, Virginia, USA S. De Capitani di Vimercati (UNIMI), S. Foresti (UNIMI), S. Jajodia, S. Paraboschi (UNIBG), G. Pelosi (UNIBG), and P. Samarati (UNIMI) 27.10.2008
A Multi-Biometric Verification System for the Privacy Protection of Iris Templates,” in Proc. of the International Workshop on Computational Intelligence in Security for Information Systems (CISIS’08), Genoa, Italy S. Cimato, M. Gamassi, V. Piuri, R. Sassi, F. Scotti 23.-.24.10.2008
“A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks” in Proc. of the International Workshop on Privacy in Location-Based Applications (PILBA 2008), Malaga, Spain C.A. Ardagna, A. Stavrou, S. Jajodia, P. Samarati, and R. Martin 09.10.2008
Image Processing for Fingerprint Biometrics via Low-cost Cameras and Webcams,” in IEEE International Conference on Biometrics: Theory, Applications and Systems, Washington DC, USA V. Piuri and F. Scotti 29.09.-01.10.2008
“Testing Privacy Awareness”, in Proc. of the IFIP/FIDIS Internet Security and Privacy Summer School, Brno, Czech Republic, to appear 2009 M. Bergmann 01.-07.09.2008
“Enhancing Multilateral Security in and by Reputation Systems”, in Proc. of the IFIP/FIDIS Internet Security and Privacy Summer School, Brno, Czech Republic, 2008/09
S. Steinbrecher 01.-07.09.2008
“Privacy Awareness – A Means To Solve The Privacy Paradox?”, in Proc. of the IFIP/FIDIS Internet Security and Privacy Summer School, Brno, Czech Republic, to appear 2009 S. Poetzsch 01.-07.09.2008
“Multilateral Secure Cross-Community Reputation Systems for Internet Communities”, Trust and Privacy in Digital Business, Fifth International Conference (TrustBus 2008), LNCS 5185, Springer Verlag Berlin, pp. 69 – 78 F. Pingel and S. Steinbrecher 25.08.2008
“Regulating Exceptions in Healthcare using Policy Spaces”, in Proc. of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, U.K. C.A. Ardagna, S. De Capitani di Vimercati, T. Grandison, S. Jajodia, P. Samarati 13.-16.7.2008
Identity Management throughout one’s whole life“, in Information Security Technical Report 13/2, 2008, pp. 83 – 94 M. Hansen, A. Pfitzmann and S. Steinbrecher 26.06.2008
Controlled Information Sharing in Collaborative Distributed Query Processing“, in Proc. of the 28th International Conference on Distributed Computing Systems (ICDCS 2008), Beijing, China S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati 17.-20.6.2008
“A Self-certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup”, in Proc. of the Second IFIP WG 11.2 International Workshop on Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks (WISTP 2008), Seville, Spain C. Andersson, M. Kohlweiss, L. A. Martucci, and A. Panchenko 13.-16.05.2008
Self-certified Sybil-free Pseudonyms“, in Proc. of the First ACM Conference on Wireless Network Security (WISEC 2008), Alexandria, USA L. A. Martucci, M. Kohlweiss, C. Andersson, and A. Panchenko 31.03.-02.04.2008
P-signatures and Noninteractive Anonymous Credentials”, in Proc. of the Fifth Theory of Cryptography Conference (TCC 2008), New York, USA M. Belenkiy, M. Chase, M. Kohlweiss, and A. Lysyanskaya 19.-21.03.2008
“Location Privacy in Pervasive Computing”, in Security and Privacy in Mobile and Wireless Networking, S. Gritzalis, T. Karygiannis, and C. Skianis (eds.), Troubador Publishing
C. A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, and P. Samarati
2008
“Managing Privacy in Location-based Access Control Systems,”in Mobile Intelligence: Mobile Computing and Computational Intelligence, John Wiley & Sons, Inc.
C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, and P. Samarati
2008
Theory of Privacy and Anonymity,” in Algorithms and Theory of Computation Handbook, second edition, M. Atallah and M. Blanton (eds), CRC Press
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, P. Samarati
2008
A Privacy-Aware Access Control System” in Journal of Computer Security (JCS), vol. 16, n. 4, 2008, pp. 369-392
C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, and P. Samarati
2008



Implementability of the Identity Management Part in Pfitzmann/Hansen’s Terminology for a Complex Digital World

Manuela Berg und Katrin Borcea-Pfitzmann