


default search action
Computers, Privacy and Data Protection 2011
- Serge Gutwirth, Yves Poullet, Paul de Hert, Ronald Leenes:

Computers, Privacy and Data Protection: an Element of Choice. Springer 2011, ISBN 978-94-007-0640-8
Building And Rebuilding Legal Concepts For Privacy And Data Protection
- Katja De Vries, Rocco Bellanova

, Paul de Hert, Serge Gutwirth:
The German Constitutional Court Judgment on Data Retention: Proportionality Overrides Unlimited Surveillance (Doesn't It?). 3-23 - Jean-François Blanchette:

The Noise in the Archive: Oblivion in the Age of Total Recall. 25-38 - Nadezhda Purtova:

Property in Personal Data: Second Life of an Old Idea in the Age of Cloud Computing, Chain Informatisation, and Ambient Intelligence. 39-64 - Norberto Nuno Gomes de Andrade:

Right to Personal Identity: The Challenges of Ambient Intelligence and the Need for a New Legal Conceptualization. 65-97
The Dark Side: Suspicions, Distrust And Surveillance
- Amos Bianchi, Denis J. Roio

:
Frames from the Life and Death of Jean Charles de Menezes. 101-109 - Christel Backman

:
Regulating Privacy: Vocabularies of Motive in Legislating Right of Access to Criminal Records in Sweden. 111-137 - Johann Cas

:
Ubiquitous Computing, Privacy and Data Protection: Options and Limitations to Reconcile the Unprecedented Contradictions. 139-169 - Franziska Boehm:

EU PNR: European Flight Passengers Under General Suspicion - The Envisaged European Model of Analyzing Flight Passenger Data. 171-199 - Arnd Weber, Dirk Weber:

Options for Securing PCs Against Phishing and Espionage: A Report from the EU-Project "Open Trusted Computing". 201-207
Privacy Practices As Vectors Of Reflection
- Bibi van den Berg

, Ronald Leenes:
Keeping Up Appearances: Audience Segregation in Social Network Sites. 211-231 - Katja De Vries:

Avatars Out of Control: Gazira Babeli, Pose Balls and "Rape" in Second Life. 233-250 - Fadhila Mazanderani, Ian Brown:

Privacy as a Practice: Exploring the Relational and Spatial Dynamics of HIV-Related Information Seeking. 251-268 - Paul Bernal:

Rise and Phall: Lessons from the Phorm Saga. 269-283 - Michel Walrave

, Wannes Heirman:
Disclosing or Protecting? Teenagers' Online Self-Disclosure. 285-307 - John J. Borking:

Why Adopting Privacy Enhancing Technologies (PETs) Takes so Much Time. 309-341
Privacy And Data Protection In The Cloud
- Gurpreet Dhillon

, Ella Kolkowska:
Can a Cloud Be Really Secure? A Socratic Dialogue. 345-360 - Joep Ruiter, Martijn Warnier

:
Privacy Regulations for Cloud Computing: Compliance and Implementation in Theory and Practice. 361-376 - Yves Poullet, Jean-Marc Van Gyseghem, Jean-Philippe Moiny, Jacques Gérard, Claire Gayrel:

Data Protection in the Clouds. 377-409 - Fosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale

, Dino Pedreschi
, Wendy Hui Wang:
Privacy-Preserving Data Mining from Outsourced Databases. 411-426 - Valentina Casola

, Raffaele Lettiero, Massimiliano Rak
, Umberto Villano:
Access Control in Cloud-on-Grid Systems: The PerfCloud Case Study. 427-444 - Wolter Pieters:

Security and Privacy in the Clouds: A Bird's Eye View. 445-457

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














