2016 IEEE Security and Privacy Workshops (SPW)

22-26 May 2016

Filter Results

Displaying Results 1 - 25 of 59
  • [Front cover]

    Publication Year: 2016, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (951 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2016, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (15 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2016, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (162 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2016, Page(s):ix - xi
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • Introduction to IWPE

    Publication Year: 2016, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (80 KB)
    Freely Available from IEEE
  • IWPE Committees

    Publication Year: 2016, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • Introduction to BioSTAR

    Publication Year: 2016, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (80 KB)
    Freely Available from IEEE
  • BioSTAR Committees

    Publication Year: 2016, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • Introduction to LangSec

    Publication Year: 2016, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • LangSec Committees

    Publication Year: 2016, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Introduction to MoST

    Publication Year: 2016, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • MoST Committees

    Publication Year: 2016, Page(s): xx
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • Introduction to  WRIT

    Publication Year: 2016, Page(s): xxi
    Request permission for commercial reuse | PDF file iconPDF (80 KB)
    Freely Available from IEEE
  • WRIT Committees

    Publication Year: 2016, Page(s): xxii
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • DataTags, Data Handling Policy Spaces and the Tags Language

    Publication Year: 2016, Page(s):1 - 8
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (949 KB) | HTML iconHTML

    Widespread sharing of scientific datasets holds great promise for new scientific discoveries and great risks for personal privacy. Dataset handling policies play the critical role of balancing privacy risks and scientific value. We propose an extensible, formal, theoretical model for dataset handling policies. We define binary operators for policy composition and for comparing policy strictness, s... View full abstract»

    Freely Available from IEEE
  • Compliance Monitoring of Third-Party Applications in Online Social Networks

    Publication Year: 2016, Page(s):9 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (350 KB) | HTML iconHTML

    With the widespread adoption of Online Social Networks (OSNs), users increasingly also use corresponding third-party applications (TPAs), such as social games and applications for collaboration. To improve their social experience, TPAs access users' personal data via an API provided by the OSN. Applications are then expected to comply with certain security and privacy policies when handling the us... View full abstract»

    Freely Available from IEEE
  • Privacy Risk Analysis Based on System Control Structures: Adapting System-Theoretic Process Analysis for Privacy Engineering

    Publication Year: 2016, Page(s):17 - 24
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    To date, top-down efforts to evolve and structure privacy engineering knowledge have tended to reflect common systems engineering/development life cycle activities. A different approach suggests a particular need for technical analytical methods. To help address this need, this paper proposes to adapt for privacy engineering an existing technique, System-Theoretic Process Analysis (STPA), develope... View full abstract»

    Freely Available from IEEE
  • A Semi-Automated Methodology for Extracting Access Control Rules from the European Data Protection Directive

    Publication Year: 2016, Page(s):25 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (395 KB) | HTML iconHTML

    Handling personal data in a legally compliant way is an important factor for ensuring the trustworthiness of a service provider. The EU data protection directive (EU DPD) is built in such a way that the outcomes of rules are subject to explanations, contexts with dependencies, and human interpretation. Therefore, the process of obtaining deterministic and formal rules in policy languages from the ... View full abstract»

    Freely Available from IEEE
  • A Critical Analysis of Privacy Design Strategies

    Publication Year: 2016, Page(s):33 - 40
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (562 KB) | HTML iconHTML

    The upcoming General Data Protection Regulation is quickly becoming of great concern to organizations which process personal data of European citizens. It is however nontrivial to translate these legal requirements into privacy friendly designs. One recently proposed approach to make 'privacy by design' more practical is privacy design strategies. This paper improves the strategy definitions and s... View full abstract»

    Freely Available from IEEE
  • Oblivious Mechanisms in Differential Privacy: Experiments, Conjectures, and Open Questions

    Publication Year: 2016, Page(s):41 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (477 KB) | HTML iconHTML

    Differential privacy (DP) is a framework to quantify to what extent individual privacy in a statistical database is preserved while releasing useful aggregate information about the database. In this work, we aim an exploratory study to understand questions related to the optimality of noise generation mechanisms (NGMs) in differential privacy by taking into consideration the (i) query sensitivity,... View full abstract»

    Freely Available from IEEE
  • Obstacles to Transparency in Privacy Engineering

    Publication Year: 2016, Page(s):49 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    Transparency is widely recognized as indispensable to privacy protection. However, producing transparency for end-users is often antithetical to a variety of other technical, business, and regulatory interests. These conflicts create obstacles which stand in the way of developing tools which provide meaningful privacy protections or from having such tools adopted in widespread fashion. In this pap... View full abstract»

    Freely Available from IEEE
  • From Privacy Impact Assessment to Social Impact Assessment

    Publication Year: 2016, Page(s):53 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (305 KB) | HTML iconHTML

    In order to address the continued decline in consumer trust in all things digital, and specifically the Internet of Things (IoT), we propose a radical overhaul of IoT design processes. Privacy by Design has been proposed as a suitable framework, but we argue the current approach has two failings: it presents too abstract a framework to inform design, and it is often applied after many critical des... View full abstract»

    Freely Available from IEEE
  • Privacy Harm Analysis: A Case Study on Smart Grids

    Publication Year: 2016, Page(s):58 - 65
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (331 KB) | HTML iconHTML

    To carry out a true privacy risk analysis and go beyond a traditional security analysis, it is essential to distinguish the notions of feared events and their impacts, called "privacy harms" here, and to establish a link between them. In this paper, we provide a clear relationship among harms, feared events, privacy weaknesses and risk sources and describe their use in the analysis of smart grid s... View full abstract»

    Freely Available from IEEE