Privacy and Identity Management. Sharing in a Digital World 18th IFIP WG 9.2, 9.6/11.7, 11.6 International Summer School, Privacy and Identity 2023, Oslo, Norway, August 8–11, 2023, Revised Selected Papers

This book contains selected papers presented at the 18th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Oslo, Norway during August 8 - 11, 2023. The 21 full papers, including 2 workshops papers, presented in this book were carefully revi...

Full description

Bibliographic Details
Other Authors: Bieker, Felix (Editor), de Conca, Silvia (Editor), Gruschka, Nils (Editor), Jensen, Meiko (Editor)
Format: eBook
Language:English
Published: Cham Springer Nature Switzerland 2024, 2024
Edition:1st ed. 2024
Series:IFIP Advances in Information and Communication Technology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Who is the attacker - Analyzing data protection violations in health care
  • Towards privacy-preserving machine learning in sovereign data spaces: opportunities and challenges
  • Secure and Privacy-Preserving Authentication for Data Subject Rights Enforcement
  • Non-Interactive Authentication Scheme for Vehicular Ad-hoc Networks: Security, Privacy, and Accountability
  • Entangled: A Case Study of Data Exchange and Actor Relationships in a Mobility Ecosystem
  • Enhancing transparency through Personal Information Management Systems: current state of service offerings and considerations for further advancements
  • User-Driven Privacy Factors in Trigger-Action Apps: A Comparative Analysis with General IoT
  • Privacy and Utility Evaluation of Synthetic Tabular Data for Machine Learning
  • Empirical Evaluation of Synthetic Data Generated by GANs and Diffusion Models.-How much is your Instagram Data Worth? Economic Perspective of Privacy in the Social Media Context
  • Keynote Papers
  • Blueprints for Deploying Privacy Enhancing Technologies in E-government
  • The effacement of information technology from EU law: the need for collaborative approaches to redesign the EU’s regulatory architecture
  • Selected Student Papers
  • Towards an Affordance-Based Typology of Personal Data Stores
  • Assuring GDPR Conformance through Language-Based Compliance
  • User Interaction Data in Apps: Comparing Policy Claims to Implementations
  • Developing with Compliance in Mind: Addressing Data Protection Law, Cybersecurity Regulation, and AI Regulation During Software Development
  • Digital Security Controversy Analysis: A Case Study of the Debate over GCHQ Exceptional Access Proposal
  • Educating Parents in Managing Online Privacy Risks: Media Educators’ Perspectives
  • A Walk in the Labyrinth. Evolving EU Regulatory Framework for Secondary Use of Electronic Personal Health Data for Scientific Research
  • Workshop and Tutorial Papers
  • Private Training Approaches - A Primer
  • Workshop on Cybersecurity of Critical Infrastructures