This publications page presents Privacy Flag publications from the first and second years of the project.
Privacy Flag will disseminate its innovation results and concepts in a range of fora, including scientific and law conferences, workshops, symposia, journals and magazines. Outputs will include publishing and submitting papers, surveys and book chapters. These actions provide an ideal opportunity for the dissemination of project results and concepts. Through these means, international researchers can be encouraged to contribute to the PF privacy-based knowledge repository and/or to get more extensive information about data privacy, data protection, PF technology and related solutions, such as the Privacy Flag UPRAAM.
Dissemination activities promoted by the Privacy Flag partners will conform to the rules and procedures contained in the Consortium Agreement (CA), which is designed to safeguard the IPRs and confidential information of the participants, whilst preserving each individual participant’s right to exploit their own IPRs and information.
Privacy Flag has already participated in several notable conferences and published a variety of publications.
The following table provides an extensible view of Privacy Flag’s publications under the first and second year.
Name of publication | Type of publication | Authors | Title of Journal/ Proceeding/Book | Publisher | ISBN | DOI | Year of publication |
A Formalization of Fingerprinting Techniques | Conference Paper | F. Lanze, A. Panchenko and T. Engel | 2015 IEEE Trustcom/BigDataSE/ISPA | IEEE | 978-1-4673-7952-6 | 10.1109/Trustcom.2015.452 | 2015 |
On the impact of Cross-Layer Information Leakage on Anonymity in Crowds | Conference Paper | A. Panchenko | 11th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (ACM Q2SWinet 2015) | ACM | 978-1-4503-3757-1 | 10.1145/2815317.2815325 | 2015 |
Website Fingerprinting at Internet Scale | Conference Paper | A. Panchenko, F. Lanze, A. Zinnen, M. Henze, J. Pennekamp, K. Wehrle and T. Engel | 23rd Internet Society (ISOC) Network and Distributed System Security Symposium (NDSS 2016) | Internet Society | 1-891562-41-X | 10.14722/ndss.2016.23477 | 2016 |
Privacy Flag – Collective Privacy Protection Scheme Based on Structured Distributed Risk Assessment | Conference Paper | S. Ziegler, I. P. Chochliouros and L. Latif | (IEEE IoT Forum 2016) – Proceedings of the IEEE World Forum for Internet of Things 2015; Special Session on IoT Security & Privacy | IEEE | – | 10.1109/WF-IoT.2015.7389093 | 2015 |
Design of Smart City Systems from a Privacy Perspective | Journal Article | A. Ståhlbröst, A. Padyab, A. Sällström and D. Hollosi | IADIS International Journal on WWW/Internet | Universidade Aberta | 1645-7641 | – | 2015 |
Bringing your data everywhere in the Internet of (every)Thing: a legal reading of the new right to portability | Conference Paper | C. Bistolfi, L. Scudiero and S. Ziegler | (AINA-2016) – Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications | IEEE | – | 10.1109/WAINA.2016.106 | 2016 |
Crowdsourced Privacy, il progetto europeo Privacy Flag | Article in a Magazine | L. Scudiero | Privacy News magazine, Year IV, September-December 2015, p. 31, Corriere della Privacy | Corriere della Privacy | – | – | 2016 |
IoT, accountability e certificazioni | Article in a Magazine | C. Bistolfi | Privacy News magazine, Year V, September-December 2015, Corriere della Privacy | Corriere della Privacy | – | – | 2016 |
Enabling Privacy Protection by using a Universal Privacy Risk Methodology in the context of 5G | Publication in Conference proceedings/Spesial Session paper | I. P. Chochliouros, E. Sfakianakis, M. Belesioti, N. Bompetsis and A. S. Spiliopoulou | Proceedings of the EuCNC – 2016 (The European Conference on Networks and Communication 2016) | European Commission in cooperation with the National technical University of Athens and University of Piraeus, Greece | – | – | 2016 |
Pseudonymization and impacts of Big (personal/anonymous) Data processing in the transition from the Directive 95/46/EC to the new EU General Data Protection Regulation | Article in Journal | L. Bolognini, C. Bistolfi | Computer Law & Security Review: The International Journal of Technology Law and Practice | Pergamon Press Ltd. | 02673649 | 10.1016/j.clsr.2016.11.002 | 2016 |
Facebook Users Attitudes towards Secondary Use of Personal Information | Conference Paper | A. Padyab, T. Päivärinta, A. Ståhlbröst and B. Bergvall-Kåreborn | Proceedings of the International Conference on Information Systems 2016 (ICIS – 2016) | AIS Electronic Library (AISeL) | – | – | 2016 |
POSTER: Fingerprinting Tor Hidden Services | Poster | A. Mitseva, A. Panchenko, F. Lanze, M. Henze, K. Wehrle and T. Engel | ACM SIGSAC Conference on Computer and Communications Security (CCS’16) | ACM | – | – | 2016 |
Reflecting on Actions in Living Lab Research | Journal | A. Ståhlbröst, M. Holst | Reflecting on Actions in Living Lab Research | Technology Innovation Management Review | – | – | 2017 |
Crowd Sourcing Based Privacy Threat Analysis and Alerting | Journal | A. Madia, S. Nikoletseas, I. Stamatiou, D. Tsolovos and V. Vlachos | 3rd International Conference on Cryptography, Cyber Security and Information Warfare (3rd CryCybIW) | Hellenic Military Academy | – | – | 2017 |
Exploring Factors Influencing User Drop-out Behavior in a Living Lab Environment | Conference Paper | A. Habibipour, A. Padyab and A. Ståhlbröst | 8th Scandinavian Conference in Information Systems, SCIS 2017 | Springer | 978-3-319-64694-7, 978-3-319-64695-4 (eBook) | 10.1007/978-3-319-64695-4 | 2017 |
End user privacy concerns in the IoT | Conference Paper | A. Padyab | ISPIM 2017 | ISPIM | – | – | 2017 |
Ensuring Privacy in 5G-Networks | Conference Paper (Special Session Paper) | A. Kostopoulos, I. P. Chochliouros, I. Papafili and A. Drakos | Proceedings of the EuCNC-2017 International Conference | University of Oulu, Finland, in cooperation with the European Commission | – | – | 2017 |
Enhancing Privacy Using Crowdsourcing Mechanism | Conference Paper | A. Kostopoulos, I. P. Chochliouros, I. Papafili and A. Drakos | Proceedings of the 21st Pan-Hellenic Conference on Informatics (PCI 2017) | ACM | 978-1-4503-5355-7 | 10.1145/3139367.3139405 | 2017 |
Enabling Crowd-sourcing-based Privacy Risk Assessment in EU – the Privacy Flag Project | Conference Paper | I. P. Chochliouros, S. Ziegler, L. Bolognini, N. Alonistioti, M. Stamatelatos, G. Mourikas, V. Vlachos, N. Gligoric and M. Holst | Proceedings of the 21st Pan-Hellenic Conference on Informatics (PCI 2017) | ACM | 978-1-4503-5355-7 | 10.1145/3139367.3139417 | 2017 |
Privacy Flag: A crowdsourcing platform for reporting and managing privacy and security risks | Conference Paper | V. Vlachos, Y. Stamatiou, A. Madhja and S. Nikoletseas | Proceedings of the 21st Pan-Hellenic Conference on Informatics (PCI 2017) | ACM | 978-1-4503-5355-7 | 10.1145/3139367.3139432 | 2017 |
Safety-aware Location Privacy in VANET: Evaluation and Comparison | Journal Paper | K. Emara | IEEE Transactions on Vehicular Technology | IEEE | Print ISSN: 0018-9545 Electronic ISSN: 1939-9359 | 10.1109/TVT.2017.2736885 | 2017 |
Analysis of Fingerprinting Techniques for Tor Hidden Services | Conference Paper | A. Panchenko, A. Mitseva, M. Henze, F. Lanze, K. Wehrle and T. Engel | Workshop on Privacy in the Electronic Society (WPES’17) | ACM | 978-1-4503-5175-1 | 10.1145/3139550.3139564 | 2017 |
Il sostegno della protezione dei dati extra UE tra codici di condotta e certificazioni | Article | C. Bistolfi | ICT Security Review | Tecna | – | – | 2018 |
Crowdsourcing Mechanisms in the Privacy Flag Framework | Conference Paper | I. P. Chochliouros, A. Kostopoulos, A. S. Spiliopoulou, S. Ziegler, L. Ladid, N. Alonistioti, M. Belesioti, S. Nikoletseas, V. Vlachos, N. Gligoric, A. Ståhlbröst, L. Bolognini, E. Vasilaki, D. Arvanitozisis and E. Sfakianakis | The 27th European Conference on Networks and Communications (EuCNC-2018) | IEEE | 978-1-5386-1478-5/18/$31.00©2018 IEEE | – | 2018 |
Drop-out in living lab field test: consequences, recommendations and ethical considerations | Conference Paper | A. Habibipour, A. Ståhlbröst, G. Annabel and B. Bergvall-Kåreborn | European Conference of Information Systems 2018 | ECIS 2018 | – | – | 2018 |
Towards a Unifying Definition and Taxonomy for Participants Drop-out in Living Lab Field Tests | Journal Paper | A. Habibipour, G. Annabel, A. Ståhlbröst, D. Schuurman and B. Bergvall-Kåreborn | TIM Review Journal | TIM Review Journal | – | – | 2018 |
Making Information Security Research Great Again: Assumptions and Practical Aspects of Case-Study Research in Information Security | Conference Paper | M. Lundgren | Second International Symposium on Small-scale Intelligent Manufacturing Systems (SIMS) | IEEE | – | – | 2018 |
Towards a unified definition of Urban Living Labs | Conference Paper | D. Chroneer, A. Habibipour and A. Ståhlbröst | ISPIM2018 | ISPIM2018 | – | – | 2018 |