Change search
Link to record
Permanent link

Direct link
BETA
Fischer-Hübner, SimoneORCID iD iconorcid.org/0000-0002-6938-4466
Alternative names
Publications (10 of 153) Show all publications
Fischer-Hübner, S. (2018). Anonymity (2ed.). In: Ling Liu och M. Tamer Özsu (Ed.), Encyclopedia of Database Systems: (pp. 4). Springer-Verlag New York
Open this publication in new window or tab >>Anonymity
2018 (English)In: Encyclopedia of Database Systems / [ed] Ling Liu och M. Tamer Özsu, Springer-Verlag New York, 2018, 2, p. 4-Chapter in book (Refereed)
Place, publisher, year, edition, pages
Springer-Verlag New York, 2018 Edition: 2
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-65655 (URN)978-1-4614-8266-6 (ISBN)978-1-4614-8265-9 (ISBN)
Available from: 2018-01-18 Created: 2018-01-18 Last updated: 2018-06-11Bibliographically approved
Fritsch, L. & Fischer-Hübner, S. (2018). Applications of Privacy and Security Research in the Upcoming Battlefield of Things. In: Audun Jøsang (Ed.), Proceedings of the 17th European Conference on Cyber Warfare and Security: . Paper presented at The 17th European Conference on Cyber Warfare and Security. Reading: Academic Conferences and Publishing International Limited
Open this publication in new window or tab >>Applications of Privacy and Security Research in the Upcoming Battlefield of Things
2018 (English)In: Proceedings of the 17th European Conference on Cyber Warfare and Security / [ed] Audun Jøsang, Reading: Academic Conferences and Publishing International Limited, 2018Conference paper, Published paper (Refereed)
Abstract [en]

This article presents the results of a trend scouting study on the applicability of contemporary information privacy and information security research in future defence scenarios in a 25-year-horizon. We sketch the expected digital warfare and defence environment as a “battlefield of things” where connected objects, connected soldiers and automated and autonomous sensing and acting systems are core elements. Based on this scenario, we discuss current research in information security and information privacy and their relevance and applicability for the future scenario.

Place, publisher, year, edition, pages
Reading: Academic Conferences and Publishing International Limited, 2018
Keywords
internet of things, autonomous systems, digital warfare, transfer of research, information privacy, information security, trend scouting, cyberwar, cybersecurity, weaponization of smart systems
National Category
Information Systems Human Computer Interaction Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-68386 (URN)978-1-911218-85-2 (ISBN)978-1-911218-86-9 (ISBN)
Conference
The 17th European Conference on Cyber Warfare and Security
Available from: 2018-07-04 Created: 2018-07-04 Last updated: 2018-07-05Bibliographically approved
Fischer-Hübner, S. & Hermann, D. (2018). Benutzbare Lösungen für den Datenschutz. In: Dr. Christian Reuter (Ed.), Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement (pp. 119-138). Wiesbaden, Tyskland: Springer Vieweg
Open this publication in new window or tab >>Benutzbare Lösungen für den Datenschutz
2018 (English)In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement / [ed] Dr. Christian Reuter, Wiesbaden, Tyskland: Springer Vieweg , 2018, p. 119-138Chapter in book (Refereed)
Place, publisher, year, edition, pages
Wiesbaden, Tyskland: Springer Vieweg, 2018
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-66470 (URN)10.1007/978-3-658-19523-6 (DOI)9783658195229 (ISBN)9783658195236 (ISBN)
Available from: 2018-02-23 Created: 2018-02-23 Last updated: 2018-03-01Bibliographically approved
Karegar, F., Gerber, N., Volkamer, M. & Fischer-Hübner, S. (2018). Helping John to Make Informed Decisions on Using Social Login. In: Proceedings of the 33th Symposium on Applied Computing (SAC 2018), Pau, F, April 9-13, 2018: . New York: ACM Publications
Open this publication in new window or tab >>Helping John to Make Informed Decisions on Using Social Login
2018 (English)In: Proceedings of the 33th Symposium on Applied Computing (SAC 2018), Pau, F, April 9-13, 2018, New York: ACM Publications, 2018Chapter in book (Other academic)
Place, publisher, year, edition, pages
New York: ACM Publications, 2018
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-65743 (URN)10.1145/3167132.3167259 (DOI)
Projects
Credential (4896)
Funder
EU, Horizon 2020
Available from: 2018-01-19 Created: 2018-01-19 Last updated: 2018-09-05Bibliographically approved
Fischer-Hübner, S. (2018). Privacy-enhancing Technologies (2ed.). In: Ling Liu och M. Tamer Özsu (Ed.), Encyclopedia of Database Systems: . Springer-Verlag New York
Open this publication in new window or tab >>Privacy-enhancing Technologies
2018 (English)In: Encyclopedia of Database Systems / [ed] Ling Liu och M. Tamer Özsu, Springer-Verlag New York, 2018, 2Chapter in book (Refereed)
Place, publisher, year, edition, pages
Springer-Verlag New York, 2018 Edition: 2
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-65654 (URN)978-1-4614-8266-6 (ISBN)978-1-4614-8265-9 (ISBN)
Available from: 2018-01-18 Created: 2018-01-18 Last updated: 2018-06-26Bibliographically approved
Fischer-Hübner, S. (2018). Pseudonymity (2ed.). In: Ling Liu och M. Tamer Özsu (Ed.), Encyclopedia of Database Systems: (pp. 99). Springer-Verlag New York
Open this publication in new window or tab >>Pseudonymity
2018 (English)In: Encyclopedia of Database Systems / [ed] Ling Liu och M. Tamer Özsu, Springer-Verlag New York, 2018, 2, p. 99-Chapter in book (Refereed)
Place, publisher, year, edition, pages
Springer-Verlag New York, 2018 Edition: 2
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-65656 (URN)978-1-4614-8266-6 (ISBN)978-1-4614-8265-9 (ISBN)
Available from: 2018-01-18 Created: 2018-01-18 Last updated: 2018-06-11Bibliographically approved
Chiaro, P., Fischer-Hübner, S., Groß, T., Krenn, S., Lorünser, T., Garcí, A. I., . . . Zanini, A. (2018). Secure and privacy-friendly storage and data processing in the cloud. In: Marit Hansen, Eleni KostaIgor, Nai-Fovino, Simone Fischer-Hübner (Ed.), Privacy and Identity Management. The Smart Revolution: . Paper presented at The 12th International IFIP Summer School on Privacy and Identity Management. 04-08 September 2017, Ispra, Italy. (pp. 153-169). Springer
Open this publication in new window or tab >>Secure and privacy-friendly storage and data processing in the cloud
Show others...
2018 (English)In: Privacy and Identity Management. The Smart Revolution / [ed] Marit Hansen, Eleni KostaIgor, Nai-Fovino, Simone Fischer-Hübner, Springer, 2018, p. 153-169Conference paper, Published paper (Refereed)
Abstract [en]

At the IFIP Summer School 2017, the two H2020 projects credential and prismacloud co-organized a workshop dedicated to introducing the necessary background knowledge and demonstrating prototypes of privacy-preserving solutions for storing, sharing, and processing potentially sensitive data in untrusted cloud environments. This paper summarizes the given presentations and presents the discussions and feedback given by the workshop attendees, including students and senior researchers from different domains as well as relevant non-academic stakeholders such as public data protection agencies. © IFIP International Federation for Information Processing 2018.

Place, publisher, year, edition, pages
Springer, 2018
Series
IFIP Advances in Information and Communication Technology, ISSN 1868-4238 ; 526
Keywords
Data protection, Demonstration, Privacy, Demonstrations, Digital storage, Back-ground knowledge, Cloud environments, Different domains, Privacy preserving solutions, Sensitive datas, Summer school, Data privacy
National Category
Computer and Information Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-68727 (URN)10.1007/978-3-319-92925-5_10 (DOI)2-s2.0-85048968004 (Scopus ID)978-3-319-92924-8 (ISBN)978-3-319-92925-5 (ISBN)
Conference
The 12th International IFIP Summer School on Privacy and Identity Management. 04-08 September 2017, Ispra, Italy.
Available from: 2018-08-15 Created: 2018-08-15 Last updated: 2018-09-13Bibliographically approved
Fischer-Hübner, S. (2018). Unobservability (2ed.). In: Ling Liu och M. Tamer Özsu (Ed.), Encyclopedia of Database Systems: (pp. 139). Springer-Verlag New York
Open this publication in new window or tab >>Unobservability
2018 (English)In: Encyclopedia of Database Systems / [ed] Ling Liu och M. Tamer Özsu, Springer-Verlag New York, 2018, 2, p. 139-Chapter in book (Refereed)
Place, publisher, year, edition, pages
Springer-Verlag New York, 2018 Edition: 2
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-65657 (URN)978-1-4614-8266-6 (ISBN)978-1-4614-8265-9 (ISBN)
Available from: 2018-01-18 Created: 2018-01-18 Last updated: 2018-06-11Bibliographically approved
Karegar, F., Lindegren, D., Pettersson, J. S. & Fischer-Hübner, S. (2018). User Evaluations of an App Interface for Cloud-Based Identity Management. In: Paspallis N., Raspopoulos M., Barry C., Lang M., Linger H., Schneider C. (Ed.), Advances in Information Systems Development: . Paper presented at 6th International Conference on Information Systems Development (ISD) held in Larnaca, Cyprus, September 6 - 8, 2017 (pp. 205-223). Cham: Springer, 26
Open this publication in new window or tab >>User Evaluations of an App Interface for Cloud-Based Identity Management
2018 (English)In: Advances in Information Systems Development / [ed] Paspallis N., Raspopoulos M., Barry C., Lang M., Linger H., Schneider C., Cham: Springer, 2018, Vol. 26, p. 205-223Conference paper, Published paper (Refereed)
Abstract [en]

Within a project developing cloud technology for identity access management, usability tests of the mock-up of a mobile app identity provider were conducted to assess Internet users’ consciousness of data disclosures in consent forms and their comprehension of the flow of authentication data. Results show that using one’s fingerprint for giving consent was easy, but most participants did not have a correct view of where the fingerprint data is used and what entities would have access to it. Familiarity with ID apps appeared to aggravate misunderstanding. In addition, participants could not well recall details of personal data releases and settings for disclosure options. An evaluation with a confirmation screen improved the recall rate slightly. However, some participants voiced a desire to have control over their data and expressed a wish to manually select mandatory information. This can be a way of slowing users down and make them reflect more.

Place, publisher, year, edition, pages
Cham: Springer, 2018
Series
Lecture Notes in Information Systems and Organisation, ISSN 2195-4968 ; 26
Keywords
Cloud computing, Identity management, Data disclosure, Usable privacy, Smartphone
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-67323 (URN)10.1007/978-3-319-74817-7_13 (DOI)978-3-319-74816-0 (ISBN)978-3-319-74817-7 (ISBN)
Conference
6th International Conference on Information Systems Development (ISD) held in Larnaca, Cyprus, September 6 - 8, 2017
Note

This article was published as manuscript in Farzaneh Karegars licentiate thesis. 

Available from: 2018-05-17 Created: 2018-05-17 Last updated: 2018-07-02Bibliographically approved
Fischer-Hübner, S. & Berthold, S. (2017). Privacy Enhancing Technologies. (3ed.). In: John Vacca (Ed.), Computer and Information Security Handbook: (pp. 759-778). Morgan Kauffman/Elsevier
Open this publication in new window or tab >>Privacy Enhancing Technologies.
2017 (English)In: Computer and Information Security Handbook / [ed] John Vacca, Morgan Kauffman/Elsevier , 2017, 3, p. 759-778Chapter in book (Refereed)
Abstract [en]

In our modern information age, recent technical developments and trends, such as mobile and pervasive computing, big data, cloud computing, and Web 2.0 applications, increasingly pose privacy dilemmas. Due to the low costs and technical advances of storage technologies, masses of personal data can easily be stored. Once disclosed, these data may be retained forever, often without the knowledge of the individuals concerned, and be removed with difficulty. Hence, it has become hard for individuals to manage and control their personal spheres. Both legal and technical means are needed to protect privacy and to (re-)establish the individuals' control. This chapter provides an overview to the area of Privacy-Enhancing Technologies (PETs), which help to protect privacy by technically enforcing legal privacy principles. It will start with defining the legal foundations of PETs, and will present a classification of PETs as well as a definition of traditional privacy properties that PETs are addressing and metrics for measuring the level of privacy that PETs are providing. Then, a selection of the most relevant PETs is presented.

Place, publisher, year, edition, pages
Morgan Kauffman/Elsevier, 2017 Edition: 3
Keywords
Data minimization; Data subjects; Legal privacy; Legitimacy; Personal privacy; Privacy; Privacy-enhancing technologies; Purpose limitation; Purpose specification; Transparency
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-65135 (URN)10.1016/B978-0-12-803843-7.00053-3 (DOI)9780128039298 (ISBN)9780128038437 (ISBN)
Available from: 2017-11-09 Created: 2017-11-09 Last updated: 2018-06-26Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-6938-4466

Search in DiVA

Show all publications