Engineering privacy

S Spiekermann, LF Cranor - IEEE Transactions on software …, 2008 - ieeexplore.ieee.org
In this paper we integrate insights from diverse islands of research on electronic privacy to
offer a holistic view of privacy engineering and a systematic structure for the discipline's …

Diffusion of federated identity management

D Hühnlein, H Roßnagel, J Zibuschka - Sicherheit 2010. Sicherheit, Schutz …, 2010 - dl.gi.de
In this work, we discuss the diffusion of federated identity management. We base our
research on Roger's diffusion of innovation theory, and derive generic factors influencing the …

Legal considerations on privacy-enhancing location based services using PRIME technology

E Kosta, J Zibuschka, T Scherner… - Computer Law & Security …, 2008 - Elsevier
The term Location Based Services (LBSs) is used for applications that leverage the user's
physical location to provide an enhanced service or experience, such as route guidance …

[PDF][PDF] SkIDentity–Vertrauenswürdige Identitäten für die Cloud

D Hühnlein, G Hornung, H Roßnagel, J Schmölz… - DA-CH Security, 2011 - ecsec.de
Durch die zunehmende Verlagerung von Geschäftsprozessen in die Cloud steigt der Bedarf
an starken und flexibel nutzbaren Authentisierungsmechanismen. Vor diesem Hintergrund …

An empirical hunt for ally co-operative cloud computing utility

AR Manu, VK Agrawal… - 2017 11th International …, 2017 - ieeexplore.ieee.org
A secured “co-operative cloud computing utility”, is a shared set of unique and virtually
interconnected system assets. These, computing services, are accessed globally using thin …

[PDF][PDF] Geospatial data issues in the provision of location-based services

P Mooney, P Corcoran, AC Winstanley - Proceedings of the 7th …, 2010 - Citeseer
Much of the recent research attention in Location-based Services has focused on issues
such as user interface design, capabilities of the mobile device operating system and …

Privacy and identity management requirements: an application prototype perspective

T Kölsch, J Zibuschka, K Rannenberg - Digital Privacy: PRIME-Privacy and …, 2011 - Springer
Introduction The following requirements, which have been derived from the previously
described application prototype scenarios, constitute features that a privacy-friendly identity …

Approaches to display of ultra-resolution video streaming by multi-transmission on tiled display environment

Y Ebara - 2012 15th International Conference on Network …, 2012 - ieeexplore.ieee.org
In order to realize advanced remote communication via WAN, we consider that non-verbal
communication play an important role, and displaying the existence of participant in remote …

Mobility and identity

D Royer, A Deuker, K Rannenberg - The Future of Identity in the …, 2009 - Springer
While identity management systems for the Internet are debated intensively, identity
management in mobile applications has grown silently over the last 17 years. Technologies …

Assessing Market Compliance of IT Security Solutions: A Structured Approach Using Diffusion of Innovations Theory

H Roßnagel, J Zibuschka - Strategic and Practical Approaches for …, 2012 - igi-global.com
In this chapter, the authors discuss the diffusion of IT security solutions. The authors base
their research on Roger's diffusion of innovations theory, and derive a model for holistic ex …