Engineering privacy
In this paper we integrate insights from diverse islands of research on electronic privacy to
offer a holistic view of privacy engineering and a systematic structure for the discipline's …
offer a holistic view of privacy engineering and a systematic structure for the discipline's …
Diffusion of federated identity management
In this work, we discuss the diffusion of federated identity management. We base our
research on Roger's diffusion of innovation theory, and derive generic factors influencing the …
research on Roger's diffusion of innovation theory, and derive generic factors influencing the …
Legal considerations on privacy-enhancing location based services using PRIME technology
The term Location Based Services (LBSs) is used for applications that leverage the user's
physical location to provide an enhanced service or experience, such as route guidance …
physical location to provide an enhanced service or experience, such as route guidance …
[PDF][PDF] SkIDentity–Vertrauenswürdige Identitäten für die Cloud
Durch die zunehmende Verlagerung von Geschäftsprozessen in die Cloud steigt der Bedarf
an starken und flexibel nutzbaren Authentisierungsmechanismen. Vor diesem Hintergrund …
an starken und flexibel nutzbaren Authentisierungsmechanismen. Vor diesem Hintergrund …
An empirical hunt for ally co-operative cloud computing utility
AR Manu, VK Agrawal… - 2017 11th International …, 2017 - ieeexplore.ieee.org
A secured “co-operative cloud computing utility”, is a shared set of unique and virtually
interconnected system assets. These, computing services, are accessed globally using thin …
interconnected system assets. These, computing services, are accessed globally using thin …
[PDF][PDF] Geospatial data issues in the provision of location-based services
Much of the recent research attention in Location-based Services has focused on issues
such as user interface design, capabilities of the mobile device operating system and …
such as user interface design, capabilities of the mobile device operating system and …
Privacy and identity management requirements: an application prototype perspective
T Kölsch, J Zibuschka, K Rannenberg - Digital Privacy: PRIME-Privacy and …, 2011 - Springer
Introduction The following requirements, which have been derived from the previously
described application prototype scenarios, constitute features that a privacy-friendly identity …
described application prototype scenarios, constitute features that a privacy-friendly identity …
Approaches to display of ultra-resolution video streaming by multi-transmission on tiled display environment
Y Ebara - 2012 15th International Conference on Network …, 2012 - ieeexplore.ieee.org
In order to realize advanced remote communication via WAN, we consider that non-verbal
communication play an important role, and displaying the existence of participant in remote …
communication play an important role, and displaying the existence of participant in remote …
Mobility and identity
D Royer, A Deuker, K Rannenberg - The Future of Identity in the …, 2009 - Springer
While identity management systems for the Internet are debated intensively, identity
management in mobile applications has grown silently over the last 17 years. Technologies …
management in mobile applications has grown silently over the last 17 years. Technologies …
Assessing Market Compliance of IT Security Solutions: A Structured Approach Using Diffusion of Innovations Theory
In this chapter, the authors discuss the diffusion of IT security solutions. The authors base
their research on Roger's diffusion of innovations theory, and derive a model for holistic ex …
their research on Roger's diffusion of innovations theory, and derive a model for holistic ex …