Change search
Refine search result
1234 1 - 50 of 164
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Alaqra, Ala(a)
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Fischer-Hübner, Simone
    Karlstad University, Division for Information Technology.
    Groß, Thomas
    Newcastle University, Newcastle, UK.
    Lorünser, Thomas
    Austrian Institute of Technology, Vienna, Austria.
    Slamanig, Daniel
    Graz University of Technology, Graz, Austria.
    Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements2015In: Privacy and Identity Management. Time for a Revolution?: 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers / [ed] David Aspinall, Jan Camenisch, Marit Hansen, Simone Fischer-Hübner, Charles Raab, Springer Publishing Company, 2015, Vol. 476, p. 79-96Conference paper (Refereed)
    Abstract [en]

    This paper summarises the results of a workshop at the IFIP Summer School 2015 introducing the EU Horizon 2020 project PRISMACLOUD, that is, Privacy and Security Maintaining Services in the Cloud. The contributions of this summary are three-fold. Firstly, it provides an overview to the PRISMACLOUD cryptographic tools and use-case scenarios that were presented as part of this workshop. Secondly, it distills the discussion results of parallel focus groups. Thirdly, it summarises a ``Deep Dive on Crypto'' session that offered technical information on the new tools. Overall, the workshop aimed at outlining application scenarios and eliciting end-user requirements for PRISMACLOUD.

  • 2.
    Alaqra, Alaa
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Pettersson, John
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Centre for HumanIT.
    Wästlund, Erik
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Service Research Center.
    Stakeholders’ Perspectives on Malleable Signatures in a Cloud-based eHealth Scenario2016In: Proceedings of the International Symposium on Human Aspects of Information Security & Assurance, 2016Conference paper (Refereed)
    Abstract [en]

    In this paper, we discuss end user requirements that we elicited for the use of malleable signatures in a Cloud-based eHealth scenario. The concept of a malleable signature, which is a privacy enhancing cryptographic scheme that enables the redaction of personal information from signed documents while preserving the validity of the signature, might be counter- intuitive to end users as its functionality does not correspond to the one of a traditional signature scheme. A qualitative study via a series of semi-structured interviews and focus groups has been conducted to understand stakeholders’ opinions and concerns in regards to the possible applications of malleable signatures in the eHealth area, where a medical record is first digitally signed by a doctor and later redacted by the patient in the cloud. Results from this study yielded user requirements such as the need for suitable metaphors and guidelines, usable templates, and clear redaction policies. 

  • 3.
    Andersson, Christer
    et al.
    Karlstad University, Division for Information Technology.
    Camenisch, Jan
    IBM Zurich Research Laboratory, Switzerland.
    Crane, Stephen
    Hewlett-Packard Laboratories, UK.
    Fischer-Hübner, Simone
    Karlstad University, Division for Information Technology.
    Leenes, Ronald
    Tilburg University, the Netherlands.
    Pearson, Siani
    Hewlett-Packard Laboratories, UK.
    Pettersson, John Sören
    Karlstad University, Division for Information Technology.
    Sommer, Dieter
    IBM Zurich Research Laboratory, Switzerland.
    Trust in PRIME2005In: Proceedings of the 5th IEEE International Symposium on Signal Processing and IT, IEEE conference proceedings, 2005, p. 552-559Conference paper (Other academic)
    Abstract [en]

    The PRIME project develops privacy enhancing identity management systems that allow users in various application areas such as e-commerce to regain control over their personal spheres. This paper introduces the PRIME technical architecture that also includes special trust-enhancing mechanisms, and shows how PRIME technologies can enhance privacy and trust of e-shopping customers. It also discusses the socio-psychological factors and HCI aspects influencing the end user's trust in privacy enhancing identity management, and shows why HCI research, user studies, and socio-psychological research, are necessary efforts to accompany system design.

  • 4. Andersson, Christer
    et al.
    Fischer Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Lundin, Reine
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Enabling anonymity for the mobile Internet using the mCrowds system2004In: Risk and Challenges of the Network Society: Proceedings of the Second IFIP WG 9.2, 9.6/11.6, 11.7 International Summer School / [ed] Penny Duquenoy, Simone Fischer-Hübner, Jan Holvast, and Albin Zuccato, Karlstad University Press, 2004, p. 178-189Chapter in book (Refereed)
    Abstract [en]

    The mobile Internet is a fast growing technology that introduces new privacy risks. We argue that, since privacy legislation alone is not sufficient to protect the users privacy, technical solutions to enhanceinformational privacy of individuals are also needed. This paper introduces mCrowds, a privacy-enhancing technology that combines the concept of a crowd system in a mobile Internet setting with a filteringfunctionality to enable anonymity towards the content providers

  • 5.
    Andersson, Christer
    et al.
    Karlstad University, Division for Information Technology.
    Fischer-Huebner, Simone
    Karlstad University, Division for Information Technology.
    Lundin, Reine
    Karlstad University, Division for Information Technology.
    Enabling Anonymity for the Mobile Internet Using the mCrowds System2003In: Risk and Challenges of the Network Society: Proceedings of the IFIP WG 9.2, 9.6/11.7 Summer School 4-8 August 2003. / [ed] Penny Duquennoy, Simone Fischer-Hübner, Jan Holvast & Albin Zuccato, Karlstad: Karlstads universitet , 2003Conference paper (Refereed)
  • 6.
    Andersson, Christer
    et al.
    Karlstad University, Division for Information Technology.
    Fischer-Hübner, Simone
    Karlstad University, Division for Information Technology. Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Lundin, Reine
    Karlstad University, Division for Information Technology. Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    mCrowds: Anonymity for the Mobile Internet2003In: HumanIT 2003, Karlstad: Karlstad University Press, 2003, p. 79-92Chapter in book (Refereed)
  • 7.
    Andersson, Christer
    et al.
    Karlstad University, Division for Information Technology.
    Lundin, Reine
    Karlstad University, Division for Information Technology.
    Fischer-Hübner, Simone
    Karlstad University, Division for Information Technology.
    Privacy-Enhanced WAP Browsing with mCrowds: Anonymity Properties and Performance Evaluation of the mCrowds System2004Conference paper (Refereed)
  • 8.
    Andersson, Christer
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Martucci, Leonardo A.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Privacy & Anonymity in Mobile Ad Hoc Networks2008In: Handbook of Research on Wireless Security / [ed] Yan Zhang, Jun Zheng & Miao Ma, IGI Global , 2008Chapter in book (Other academic)
  • 9. Andersson, Christer
    et al.
    Martucci, Leonardo
    Fischer Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Privacy and Anonymity in Mobile Ad Hoc Networks2008In: Mobile Computing: Concepts, Methodologies, Tools, and Applications / [ed] David Taniar, Information Science Reference , 2008Chapter in book (Refereed)
  • 10. Andersson, Christer
    et al.
    Martucci, Leonardo
    Fischer Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Privacy Requirements for Mobile Ad Hoc Networks2005Conference paper (Refereed)
  • 11.
    Angulo, Julio
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Centre for HumanIT.
    Berthold, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Elkhiyaoui, Kaoutar
    EURECOM.
    Fernandez Gago, M. Carmen
    University of Málaga.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    David, Nunez
    University of Málaga.
    Pulls, Tobias
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science. Karlstad University.
    Reuben, Jenni
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science. Karlstad University.
    Van Rompay, Cédric
    EURECOM.
    Santana de Oliveira, Anderson
    SAP Labs.
    Önen, Melek
    EURECOM.
    D:D-5.3 User-Centric Transparency Tools V22015Report (Refereed)
  • 12.
    Angulo, Julio
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Pulls, Tobias
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Ulrich, König
    HCI for Policy Display and Administration2011In: Privacy and Identity Management for Life / [ed] Jan Camenish, Simone Fischer-Hübner and Kai Rannenberg, Berlin: Springer Berlin/Heidelberg, 2011, 1, p. 261-277Chapter in book (Refereed)
    Abstract [en]

    The PrimeLife Policy Language (PPL) has the objective of helping end users make the data handling practices of data controllers more transparent, allowing them to make well-informed decisions about the release of personal data in exchange for services. In this chapter, we present our work on user interfaces for the PPL policy engine, which aims at displaying the core elements of a data controller's privacy policy in an easily understandable way as well as displaying how far it corresponds with the user's privacy preferences. We also show how privacy preference management can be simplified for end users.

  • 13.
    Angulo, Julio
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Pulls, Tobias
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Wästlund, Erik
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Psychology.
    Towards Usable Privacy Policy Display & Management2012In: Information Management & Computer Security, ISSN 0968-5227, Vol. 20, p. 4-17Article in journal (Refereed)
    Abstract [en]

    This paper discusses the approach taken within the PrimeLife project for providing user-friendly privacy policy interfaces for the PrimeLife Policy Language (PPL).We present the requirements, design process and usability testing of the “Send Data?” prototype, a browser extension designed and developed to deal with the powerful features provided by PPL. Our interface introduces the novel features of “on the fly” privacy management, predefined levels of privacy settings, and simplified selectionof anonymous credentials. Results from usability tests showed that users understand and appreciate these features and perceive them as being privacy-friendly, and they are therefore suggested as a good approach towards usable privacy policy display and management. Additionally, we present our lessons learnt in the design process of privacy policy interfaces.

  • 14.
    Angulo, Julio
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Fischer-Hübner, Simone
    Karlstad University, Division for Information Technology.
    Pulls, Tobias
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Wästlund, Erik
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Psychology.
    Usable Transparency with the Data Track: A Tool for Visualizing Data Disclosures2015In: CHI EA '15 Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems / [ed] Bo Begole, Jinwoo Kim, Kori Inkpen, Woontack Woo, Association for Computing Machinery (ACM), 2015, p. 1803-18098Conference paper (Refereed)
    Abstract [en]

    We present a prototype of the user interface of a transparency tool that displays an overview of a user's data disclosures to different online service providers and allows them to access data collected about them stored at the services' sides. We explore one particular type of visualization method consisting of tracing lines that connect a user's disclosed personal attributes to the service to which these attributes have been disclosed. We report on the ongoing iterative process of design of such visualization, the challenges encountered and the possibilities for future improvements.

  • 15.
    Angulo, Julio
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Wästlund, Erik
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Psychology. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT. Karlstad University, Faculty of Economic Sciences, Communication and IT, Service Research Center.
    Pulls, Tobias
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Towards Usable Privacy Policy Display & Management: The PrimeLife Approach2011In: Proceedings of 5th International Symposium on Human Aspects of Information Security & Assurance / [ed] Steven Furnell, Plymouth: University of Plymouth , 2011, p. 108-118Conference paper (Refereed)
  • 16.
    Angulo, Julio
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Wästlund, Erik
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Psychology.
    Gullberg, Peter
    Gemalto, Gothenburg.
    Kling, Daniel
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management.
    Tavemark, Daniel
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management.
    Fischer-Hübner, Simone
    Karlstad University, Division for Information Technology.
    Understanding the user experience of secure mobile online transactions in realistic contexts of use2012In: Symposium on Usable Privacy and Security (SOUPS) 2012, Washington D.C.,USA: ACM Digital Library, 2012, p. 8-Conference paper (Refereed)
    Abstract [en]

    Possible attacks on mobile smart devices demand higher security for applications handling payments or sensitive information. The introduction of a tamper-proof area on future generations of mobile devices, called Trusted Execution Environment (TEE), is being implemented. Before devices with embedded TEEs can be deployed to the public, investigations on usability aspects of Trusted User Interfaces (TUI) are needed. This article describes the process we have followed at gathering requirements, prototyping and testing suitable designs for TUIs in combination with a touch-screen biometric system. At the end, we present relevant findings of a pilot study that we have conducted using an Experience Sampling Method (ESM) as part of our ongoing work.

  • 17. Aspinall, David
    et al.
    Camenisch, Jan
    Hansen, Marit
    Fischer-Hübner, Simone
    Karlstad University, Division for Information Technology.
    Privacy and Identity Management – Time for a Revolution?: 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School2016Book (Refereed)
  • 18. Bernsmed, Karin
    et al.
    Fischer-Hübner, Simone
    Karlstad University, Division for Information Technology.
    Secure IT Systems: 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings2014 (ed. 1)Book (Refereed)
  • 19.
    Berthold, Stefan
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Martucci, Leonardo
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Pulls, Tobias
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Crime and Punishment in the Cloud: Accountability, Transparency, and Privacy2013Conference paper (Refereed)
    Abstract [en]

    The goal of this work is to reason on the complexity of the relationship between three non-functional requirements in cloud comput-ing; privacy, accountability, and transparency. We provide insights on the complexity of this relationship from the perspectives of end-users, cloud service providers, and third parties, such as auditors. We shed light onthe real and perceived conflicts between privacy, transparency, and accountability, using a formal definition of transparency and an analysis on how well a privacy-preserving transparency-enhancing tool may assist in achieving accountability. Furthermore, we highlight the importance of the privacy impact assessment process for the realisation of both transparency and accountability.

  • 20. Bezzi, Michele
    et al.
    Duquenoy, Penny
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Hansen, Marit
    Zhang, Ge
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Privacy and Identity Management for Life: 5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School, Nice, France, September 7-11, 2009, Revised Selected Papers2010Book (Refereed)
  • 21.
    Brunström, Anna
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Fischer Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Martucci, Leonardo
    NEWCOM DR7.1: Report on the knowledge gaps to be filled and the action plan2004Report (Refereed)
    Abstract [en]

    This deliverable is the starting point of the activities in the NEWCOM Department 7 QoS Provision in Wireless Networks: Mobility, Security and Radio Resource Management. It provides the view of the department in terms of the objectives of the European research on Wireless Network aspects and, after developing the framework for QoS provision in wireless networks, it identifies the knowledge gaps existing in the fields of radio resource allocation, mobility management and security issues. As a result of that, the action plan for the future activities in the department is established

  • 22. Bubenko jr, Janis
    et al.
    Fischer Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Nilsson, Anders G.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management.
    Promote IT 2004: Proceedings of the Fourth Conference for the Promotion of research in IT at New Universities and University Colleges in Sweden, 5-7 May, Karlstad University, The Knowledge Foundation, Part 1 and Part 22004Book (Refereed)
    Abstract [sv]

    The Knowledge Foundation of Sweden and Karlstad University are proud to announce the fourth annual conference for promoting research and advanced education in topics of IT at Sweden's new universities and university colleges. The conference takes place at Karlstad University in Sweden, May 5-7, 2004.



    The conference is in the Foundation's programme for promoting research and advanced education in topics of IT at Sweden's new universities and university colleges. Almost 200 MSEK (about 22 MEUR) has been allocated, for a period of five years, in order to increase the number of IT-teachers with a PhD. degree at Sweden's new universities and university colleges.



    Since the start of the programme in year 2000, almost one hundred persons are actively pursuing their graduate studies and research at these new universities and colleges. These are the persons that now present their progress at this conference

  • 23. Camenisch, Jan
    et al.
    Crispo, Bruno
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Leenes, Ronald
    Russello, Giovanni
    Privacy and Identity Management for Life: 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, Trento, Italy, September 5-9, 2011. Revised Selected Papers2012Book (Refereed)
  • 24. Camenisch, Jan
    et al.
    Fischer-Hübner, Simone
    Karlstad University, Division for Information Technology.
    Hansen, Marit
    Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7-12, 2014, Revised Selected Papers2015Book (Refereed)
  • 25. Camenisch, Jan
    et al.
    Fischer-Hübner, Simone
    Karlstad University, Division for Information Technology.
    Murayama, Yuko
    Future Challenges in Security and Privacy for Academia and  Industry2013In: Computers & security (Print), ISSN 0167-4048, E-ISSN 1872-6208, Vol. 33, p. 1-170Article in journal (Refereed)
  • 26. Camenisch, Jan
    et al.
    Fischer-Hübner, SimoneKarlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.Murayama, YukoPortmann, ArmandRieder, Carlos
    Future Challenges in Security and Privacy for Academia and Industry: Proceedings of the 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne/Switzerland, June 20112011Conference proceedings (editor) (Refereed)
  • 27. Camenisch, Jan
    et al.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Rannenberg, Kai
    Privacy and Identity Management for Life2011Book (Refereed)
  • 28. Camenisch, Jan
    et al.
    Shelat, Abhi
    Sommer, Dieter
    Fischer Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Hansen, Marit
    Krasemann, Henry
    Lacoste, Gerard
    Leenes, Ronald
    Tseng, Jimmy
    Privacy and Identity Management for Everyone2005Conference paper (Refereed)
  • 29.
    Chiaro, Pasquale
    et al.
    InfoCert, Milan, Italy.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Groß, Thomas
    University of Newcastle upon Tyne, Newcastle upon Tyne, UK.
    Krenn, Stephen
    AIT Austrian Institute of Technology GmbH, Vienna, Austria.
    Lorünser, Tomas
    AIT Austrian Institute of Technology GmbH, Vienna, Austria.
    Garcí, Ana Isabel Martinez
    ETRA Investigacion y Desarrollo, S.A., Valencia, Spain.
    Migliavacca, Andrea
    Lombardia Informatica S.p.A., Milan, Italy.
    Rannenberg, Kai
    Goethe University Frankfurt, Frankfurt, Germany.
    Slamanig, Daniel
    AIT Austrian Institute of Technology GmbH, Vienna, Austria.
    Striecks, Christoph
    AIT Austrian Institute of Technology GmbH, Vienna, Austria.
    Zanini, Alberto
    Lombardia Informatica S.p.A., Milan, Italy.
    Secure and privacy-friendly storage and data processing in the cloud2018In: Privacy and Identity Management. The Smart Revolution / [ed] Marit Hansen, Eleni KostaIgor, Nai-Fovino, Simone Fischer-Hübner, Springer, 2018, p. 153-169Conference paper (Refereed)
    Abstract [en]

    At the IFIP Summer School 2017, the two H2020 projects credential and prismacloud co-organized a workshop dedicated to introducing the necessary background knowledge and demonstrating prototypes of privacy-preserving solutions for storing, sharing, and processing potentially sensitive data in untrusted cloud environments. This paper summarizes the given presentations and presents the discussions and feedback given by the workshop attendees, including students and senior researchers from different domains as well as relevant non-academic stakeholders such as public data protection agencies. © IFIP International Federation for Information Processing 2018.

  • 30. de Leeuw, Elisabeth
    et al.
    Fischer Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Tseng, Jimmy
    Borking, John
    Proceedings of the First IFIP WG 11.6 Working Conference on Policies & Research in Identity Management (IDMAN07)2008Book (Refereed)
  • 31. Debbah, Merouane
    et al.
    Fischer Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Guillaud, Maxime
    Intermediate report about wireless secrecy metrics and preliminary algorithms: NEWCOM++ DR.A.12008Report (Refereed)
    Abstract [en]

    This deliverable provides a first overview of the state of the art on wireless security metrics and algorithms,

    which are particularly very important with respect to the intrinsic vulnerability of the wireless

    medium. The first part deals with building practical physical layer information-theoretic secure schemes.

    Indeed, Shannon formalized the concepts of capacity (as a transmission efficiency measure) and equivocation

    (as a measure of secrecy). While the concept of capacity has been extended to fading channels

    with the introduction of concepts like the outage capacity or the ergodic capacity, similar paths are yet to

    be developed concerning equivocation. In the second part, we present a taxonomy of threats for wireless

    networks, and particularly for wireless sensor networks, in terms of the affected protocol layers. Besides,

    an overview to attack tree and attack graph techniques as formal means for describing and measuring

    vulnerabilities and thus also for assessing also the security level of wireless sensor networks is provided.

    Finally, an overview to suitable security concepts for wireless networks is given

  • 32. Escudero-Pascual, A.
    et al.
    Holleboom, Thijs Jan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Fischer Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Privacy for location data in mobile networks, a summary2003Conference paper (Refereed)
    Abstract [en]

    EU Directive 2002/58/EC has introduced, by means of Art. 9, special protection for location data other than traffic data. In this paper, we argue that also location data within traffic data can contain sensitive information about the relative positioning and co-located displacements of mobile nodes and thus also

    requires special protection.



    Brief discussions are given to how mobility is supported in IP networks, to the level of privacy protection for location data that was introduced in the new European Union data protection directive, and to means of protecting privacy by technology. The concept of \textit{co-located displacements in

    MobileIP} is introduced and we show how the home agent will be able to determine whether or not a set of mobile nodes move in a co-located fashion.



    Finally we present how, also for location information within traffic data, privacy-enhancing technologies can be used to provide the level of privacy protection that is required by Art. 9 of the EU Directive 2002/58/EC for location data other than traffic data.

  • 33. Fernández Gago, M. Carmen
    et al.
    Tountopoulos, Vassilis
    Fischer-Hübner, Simone
    Karlstad University, Division for Information Technology.
    Nuñez, David
    Angulo, Julio
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Pulls, Tobias
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Koulouris, Theo
    Tools for Cloud Accountability: A4Cloud Tutorial2015In: Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7-12, 2014, Revised Selected Papers / [ed] Jan Camenisch, Simone Fischer-Hübner, Marit Hansen, Springer Berlin/Heidelberg, 2015, p. 219-236Chapter in book (Refereed)
    Abstract [en]

    Cloud computing is becoming a key IT infrastructure technology being adopted progressively by companies and users. Still, there are issues and uncertainties surrounding its adoption, such as security and how users data is dealt with that require attention from developers, researchers, providers and users. The A4Cloud project tries to help solving the problem of accountability in the cloud by providing tools that support the process of achieving accountability. This paper presents the contents of the first A4Cloud tutorial. These contents include basic concepts and tools developed within the project. In particular, we will review how metrics can aid the accountability process and some of the tools that the A4Cloud project will produce such as the Data Track Tool (DTT) and the Cloud Offering Advisory Tool (COAT).

  • 34.
    Fischer Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Anonymity2009In: Encyclopedia of Database Systems, Heidelberg: Springer , 2009, p. 90-91Chapter in book (Refereed)
  • 35.
    Fischer Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms2001Book (Refereed)
  • 36.
    Fischer Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Privacy and Security at Risk in the Global Information Society2000Report (Refereed)
  • 37.
    Fischer Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Pseudonymity2009In: Encyclopedia of Database Systems / [ed] Liu, Ling; Özsu, M.Tamer, Heidelberg: Springer , 2009, p. 2207-Chapter in book (Refereed)
  • 38.
    Fischer Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    The Conflict between Privacy and Digital Forensics2010Conference paper (Refereed)
  • 39.
    Fischer Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Unobservability2009In: Encyclopedia of Database Systems / [ed] Liu, Ling; Özsu, M.Tamer, Heidelberg: Springer , 2009, p. 3240-Chapter in book (Refereed)
  • 40.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Andersson, Christer
    Framework V0: PRIME project deliverable D14.0a2004Report (Refereed)
    Abstract [en]

    This document establishes the initial framework (V0) for the PRIME (Privacy and Identity

    Management for Europe) project, which is a holistic framework that provides a detailed map of

    privacy-enhancing identity management: it defines the problem space, the vision of PRIME, lists

    the PRIME stakeholders and clarifies their roles and responsibilities. It provides a set of

    application scenarios and describes the legal and social environment of PRIME as well as

    business models and economic drivers. Besides, it defines PRIME concepts and terminology and

    discusses PRIME models for users and metaphors.

    This initial PRIME framework describes work in progress and will be further elaborated and

    refined for the PRIME framework V1.

  • 41.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Andersson, Christer
    Privacy Risks and Challenges for the Mobile Internet2004Conference paper (Refereed)
    Abstract [en]

    While the mobile Internet offers many useful services, it also

    poses new social risks and challenges that have to be

    addressed by law and technology. This paper will present

    trends for location based service applications and will discuss

    their privacy challenges and risks. It will discuss how far the

    EU Directive 2002/58/EC on privacy and electronic

    communications can help to protect privacy in mobile

    environments and what are the Directives limitations and

    controversies. Finally, it will be outlined how privacy enhancing

    technologies can help to technically enforce legal

    privacy requirements of EU Directive 2002/58/EC.

  • 42.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Andersson, Christer
    Holleboom, Thijs Jan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Framework V1: PRIME project deliverable D14.1a2005Report (Refereed)
    Abstract [en]

    This document establishes the Framework Version 1 for the PRIME (Privacy and Identity Management

    for Europe) project, which is a holistic framework that provides a detailed map of privacy-enhancing

    identity management: it defines the problem space, the vision of PRIME, terminology and concepts,

    models for users, metaphors, application scenarios, the legal, social and technical options, possible

    business cases, and the technical challenges. In particular, the framework also encompasses a technical

    architecture that specifically focuses on how the various mechanisms can or must interrelate.

    The PRIME Framework V1 describes work in progress and presents first project results that were

    achieved after the first year of the project. It will be further elaborated and refined for the next PRIME

    Framework versions.

  • 43.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Andersson, Christer
    Panchenko, Andriy
    Practical Anonymous Communication on the Mobile Internet using TOR2007Conference paper (Refereed)
  • 44.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    de Leeuw, ElisabethFritsch, Lothar
    Policies and Research in Identity Management: Proceedings of the Second IFIP WG11.6 working conference IDMAN 2010, Oslo, Norway, November 18-19, 20102010Conference proceedings (editor) (Refereed)
  • 45.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Duquenoy, PennyMiddlesex University, The United Kingdom.Zuccato, AlbinTeliaSonera, Sweden.Martucci, LeonardoKarlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    The Future of Identity in the Information Society2008Collection (editor) (Refereed)
  • 46.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Escudero Pascual, A.
    Lindskog, H.
    Preventing Privacy Attacks and Cyber Crime in the Mobile Internet2002Conference paper (Refereed)
  • 47.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Furnell, Steven
    Lambrinoudakis, Costas
    Trust and Privacy in Digital Business: Third International Conference, Proceedings of TrustBus 20062006Book (Refereed)
  • 48.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Georgiadou, Yola
    Surveillance and Privacy2010In: What Kind of Information Society?: Governance, Virtuality, Surveillance, Substainability, Resilience / [ed] Berleur, Jacques J.; Hercheui, Magda David; Hilty, Lorenz M., Berlin: Springer , 2010, p. 175-177Conference paper (Refereed)
  • 49.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Hedbom, Hans
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    A Holistic Privacy Framework for RFID Applications: FIDIS EU Project Deliverable D12.32007Report (Refereed)
  • 50.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Hedbom, Hans
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Benefits of Privacy-Enhancing Identity Management2008In: Asia-Pacific Business Review, ISSN 0973-2470, Vol. 4, no 4, p. 36-52Article in journal (Refereed)
    Abstract [en]

    Privacy-enhancing identity management systems allow users to act securely in the information society while keeping sovereignty over their personal spheres. This paper elaborates the benefits that privacy-enhancing identity management can provide for both end users and services sides. These benefits include increased privacy protection for end users and enhanced trust relations between users and services sides. The PRIME system developed within the EU project PRIME (Privacy and Identity Management for Europe) and a PRIME-enable e-shopping application scenario are used to illustrate these benefits. Besides, also potential business drivers for services sides to deploy privacy-enhancing identity management systems are discussed.

1234 1 - 50 of 164
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf