Publications

Over the course of the project, members of the PRIPARE consortium published a number of blog entries in the Security Engineering Forum. A list of these blog entries can be found here.

The following publications stem from work conducted in the PRIPARE project:

Bringer, J., Chabanne, H. Le Métayer, D. and R. Lescuyer, ‘Reasoning about privacy properties of biometric system architectures in the presence of information leakage’, Information Security Conference, 2015

Perry, S. and C. Roda, ‘Valuing Privacy through Privacy by Design’, In proceedings Amsterdam Privacy Conference 2015, 2015

Tsormpatzoudi, P., ‘A legal perspective on Privacy by Design, Future of European Observer’, 3, p.6-7, ZEI publications, 2015 available at: https://www.zei.uni-bonn.de/dateien/future-of-europe-observer/future-of-europe-observer-vol-3-no2

Fazouane, M., Kopp, H., van der Heijden, R.W., Le Métayer, D. and F. Kargl, “Formal Verification of Privacy Properties in Electric Vehicle Charging”, in International Symposium on
Engineering Secure Software and Systems (ESSOS), 2015

Gurses, S., Troncoso, C. and C. Diaz, “Engineering Privacy by Design Reloaded,” in Amsterdam Privacy Conference 2015, October 2015

Notario, N., A. Crespo, Y.S. Martín,  J. M. del Álamo, D. Le Métayer, T. Antignac, A. Kung, I. Kroener and D. Wright (2015) ‘PRIPARE: Integrating Privacy Best Practices into a Privacy Engineering Methodology’, International Workshop on Privacy Engineering Proceedings, pp.151 – 158.

Tsormpatzoudi, P., Dimitrova D., Schroers J. and E. Kindt, “Privacy by Design – The Case of Automated Border Control” in Jan Camenisch, Simone Fischer Hübner, Marit Hansen (2015) (eds.) Privacy and Identity Management for the Future Internet in the Age of Globalisation IFIP Advances in Information and Communication Technology, Volume 457, pp. 139-152.

Lazaro, C. and D. Le Métayer (2015) ‘Control over personal data: true remedy or fairy tale?’ SCRIPTed, Vol 12, No.1, pp. 1-77 http://script-ed.org/?page_id=32.

Bringer, J., H. Chabanne, D. Le Métayer, R. Lescuyer (2015) ‘Privacy by design in practice: reasoning about privacy properties of biometric system architectures’ Proceedings of the 20th International Symposium on Formal Methods, FM 2015, Springer.

Antignac, T. and D. Le Métayer (2015) ‘Trust driven strategies for privacy by design’ in Trust Management IX (IFIP-TM 2015), Hamburg, Springer.

Le Métayer, D. (2015) ‘Whom to trust? Using technology to enforce privacy’ in Wright, D. and P. De Hert (eds.) Enforcing Privacy, Springer.

Martin, Y.S., Del Álamo, J.M., and Yelmo, J.C. (2014) Privacy Requirements Engineering: Valuable Lessons from Another Realm, 1st International Workshop on Evolving Security and Privacy Requirements Engineering – ESPRE2014 (co-located with the 22nd International Requirements Engineering Conference), Karlskrona (Suecia), pp. 19-24.

Kroener, I. and Wright, D. (2014) ‘A Strategy for Operationalising Privacy by Design’ in The Information Society 30: 355-365.

Oya, S., Troncoso, C., Pérez-González, F. (2014) ‘Do Dummies Pay Off? Limits of Dummy Traffic Protection in Anonymous Communications’, Privacy Enhancing Technologies Symposium 2014, pp.204-223.

Antignac, T. and Le Métayer, D. (2014), ‘Privacy Architectures: Reasoning about Data Minimisation and Integrity’, in Security and Trust Management (STM 2014), Volume 8743 of the Lecture Notes in Computer Science, pages 17-32, Springer.

Antignac, T. and Le Métayer, D. (2014), ‘Privacy by Design: From Technologies to Architectures’ (Position Paper), in  Privacy Technologies and Policy. LNCS 8050, Springer, pp. 1-17.

Ta, V-T and Antignac, T. (2014), ‘Privacy by Design: On the Conformance Between Protocols and Architectures’, in Foundations and Practices of Security, Springer.

Roda C., Orozco F. (2014) ‘Privacy and unintended consequences of online narratives’ Récit et savoir; 23 to 27 June 2014 – University Paris Diderot, France.

Roda C. (2014) What’s mine in my images? A tour of the use and misuse of photographic images online “Image not Available”: Networked Visuality and Its Limits, International conference; 10 May 2014 Paris.

Fazouane, M., Kopp, H., van der Heijden, R.W., Le Métayer, D. and Kargl, F., Formal Verification of Privacy Properties in Electric Vehicle Charging, in International Symposium on Engineering Secure Software and Systems, Springer.

Notario, N., Crespo, A., Kung, A., Kroener, I., Le Métayer, D., Troncoso,C., del Álamo, J. and Martín, Y.S.: ‘PRIPARE: A New Vision on Engineering Privacy and Security by Design’. Cyber Security and Privacy (CSP) Forum 2014. Springer CCIS series, forthcoming.

Perry, S., Roda C. Teaching Privacy by Design to Non-Technical Audiences. Cyber Security and Privacy (CSP) Forum 2014. Springer CCIS series, forthcoming.

Antonio Kung. PEARs: Privacy Enhancing ARchitectures. Annual Privacy Forum, May 21-22, 2014, Athens, Greece. Proceedings APF14 “Privacy Technologies and Policy”. Lecture Notes in Computer Science Volume 8450, 2014, pp 18-29.