Maurizio Naldi, Giuseppe F. Italiano, Kai Rannenberg, Manel Medina, Athena Bourka (eds.).
Cham, Switzerland :
Springer,
2019.
1 online resource (xii, 211 pages) :
illustrations (some color)
Lecture notes in computer science ;
LNCS sublibrary. SL 4, Security and cryptology
11498
Includes author index.
International conference proceedings.
Intro; Preface; Organization; Contents; Transparency; Towards Real-Time Web Tracking Detection with T. EX -- The Transparency EXtension; 1 Introduction; 2 Objectives and Requirements; 3 Limitations; 4 Related Work; 5 Implementation; 5.1 HTTP and HTTPS Traffic Logging and Recording; 5.2 Persistent Storage of Records; 5.3 Encryption and Decryption of Chunks; 5.4 Data Visualization; 6 Evaluation; 7 Conclusion and Outlook; References; Towards Transparency in Email Tracking; 1 Introduction; 2 Related Work; 3 System Overview; 3.1 Adding a Service; 3.2 Analyzing Emails; 3.3 Providing Transparency
3.4 Challenges4 Preliminary Results; 4.1 Case Study 1: Individual Service Analysis; 4.2 Case Study 2: A/B Testing; 4.3 Case Study 3: Link Personalization; 5 Future Work; 6 Conclusion; References; Sharing Cyber Threat Intelligence Under the General Data Protection Regulation; Abstract; 1 Introduction; 2 Methodology; 2.1 Defining DataTags Related to Cybersecurity Information Sharing; 2.2 Policy Space; 2.3 Decision Graph; 3 Use Cases; 4 Related Work; 5 Conclusion and Future Work; Acknowledgment; References; Users' Rights
4.3 Machine Unlearning5 Discussion and Conclusions; References; Risk Assessment; A Multilateral Privacy Impact Analysis Method for Android Apps; 1 Introduction; 2 Data Acquisition Methodology; 2.1 Permission Manifest Analysis (A1); 2.2 Privacy Policy Analysis (A2); 2.3 Permission Usage Analysis (A3); 2.4 User Reviews Analysis (A4); 3 Multilateral Analysis; 3.1 Step A1: Permission Manifest Analysis; 3.2 Step A2: Privacy Policy Analysis; 3.3 Step A3: Permission Usage Analysis; 3.4 Step A4: User Reviews Analysis; 3.5 Synthesis of Analysis; 4 Related Work; 5 Conclusions and Future Work
Fight to Be Forgotten: Exploring the Efficacy of Data Erasure in Popular Operating Systems1 Introduction; 2 Background; 2.1 Personal Data Hygiene; 2.2 Delete and Erase Functions; 3 Methodology; 3.1 Forensic Analysis; 4 Results; 4.1 macOS 10.14; 4.2 Windows 10; 4.3 Results of Forensic Analysis; 5 Discussion; 5.1 Default Options; 5.2 Incorrect Terminology; 5.3 Insufficient Guidance and Cues; 5.4 OS-Independent Implications; 6 Limitations; 7 Conclusion; References
Privacy Beyond Confidentiality, Data Science Beyond Spying: From Movement Data and Data Privacy Towards a Wider Fundamental Rights Discourse1 Introduction; 2 Case Study 1: New York City Tax Rides Dataset; 3 Case Study 2: AIS Data for Describing Migrant Rescue Operations; 4 Towards a Comparative Analysis; 5 Conclusion; References; Making Machine Learning Forget; 1 Introduction; 2 The ``Right-to-be-Forgotten; 3 Privacy Leakage in Machine Learning Systems; 4 Implementing ``Right-to-be-Forgotten'' in Machine Learning Models; 4.1 Influence Functions; 4.2 Differential Privacy
0
8
8
8
8
This book constitutes the refereed conference proceedings of the 7th Annual Privacy Forum, APF 2019, held in Rome, Italy, in June 2019. The 11 revised full papers were carefully reviewed and selected from 49 submissions. The papers present original work on the themes of data protection and privacy and their repercussions on technology, business, government, law, society, policy and law enforcement bridging the gap between research, business models, and policy. They are organized in topical sections on transparency, users' rights, risk assessment, and applications.