Skip to main content
European Commission logo
English English
CORDIS - EU research results
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

Enabling Crowd-sourcing based privacy protection for smartphone applications, websites and Internet of Things deployments

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

UPRAAMs and in-depth risk analysis modelling report - updated
Final integration test and validation report

Deliverable 5.3: Final integration test and validation report

Technical risks analysis report

D2.2: Technical risks analysis report

Updated Architecture Design

Deliverable 1.3: Updated Architecture Design

Initial test and validation report

Deliverable 5.2: Initial test and validation report

Integration, tests and validation plan

Deliverable 5.1: Integration, tests and validation plan

Second year report on Technical enablers development.

Deliverable 4.2: Second year report on Technical enablers development.

Requirements Report

Deliverable 1.1: Requirements Report

Initial Architecture Design

Deliverable 1.2: Initial Architecture Design

Legal Framework Analysis Report

D2.1: Legal Framework Analysis Report

Third year report on Technical enablers development

Deliverable 4.3: Third year report on Technical enablers development.

Outreach and dissemination report - Year 1

Deliverable 6.2: Outreach and dissemination report - Year 1

Project presentation

Deliverable 7.1: Project presentation Delivery date: M1; Nature: Report (R); Dissemination level: Public (PU); Deliverable Leader: MI.

First year report on Technical enablers development.

Deliverable 4.1: First year report on Technical enablers development.

UPRAAMs and in-depth risk analysis modelling report

D2.3: UPRAAMs and in-depth risk analysis modelling report

Outreach and dissemination report - Year 3

Deliverable 6.4: Outreach and dissemination report - Year 3

Outreach and dissemination report - Year 2

Deliverable 6.3: Outreach and dissemination report - Year 2

Final Architecture Design

Deliverable 1.4: Final Architecture Design

Voluntary compliance commitment tool (fully operational)

Deliverable 3.4: Voluntary compliance commitment tool (fully operational)

Initial version of knowledge base with privacy assessment

Deliverable 5.4: Initial version of knowledge base with privacy assessment

Assessment tools final report

Deliverable 3.5: Assessment tools final report

Data valuation tool fully operational

Deliverable 3.1: Data valuation tool fully operational

Crowd-sourcing tools for risk assessment (fully operational)

Deliverable 3.2: Crowd-sourcing tools for risk assessment (fully operational)

Publications

Safety-Aware Location Privacy in VANET: Evaluation and Comparison

Author(s): Karim Emara
Published in: IEEE Transactions on Vehicular Technology, Issue 66/12, 2017, Page(s) 10718-10731, ISSN 0018-9545
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TVT.2017.2736885

Pseudonymization and impacts of Big (personal/anonymous) Data processing in the transition from the Directive 95/46/EC to the new EU General Data Protection Regulation

Author(s): Luca Bolognini, Camilla Bistolfi
Published in: Computer Law & Security Review, Issue 33/2, 2017, Page(s) 171-181, ISSN 0267-3649
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.clsr.2016.11.002

Design of Smart City Systems from a Privacy Perspective

Author(s): Ståhlbröst, A., Padyab A., Sällström A. and Hollosi D.
Published in: IADIS International Journal on WWW/Internet, Issue 13, 2015, Page(s) 1-16, ISSN 1645-7641
Publisher: Universidade Aberta

Reflecting on Actions in Living Lab Research

Author(s): Anna Ståhlbröst, Marita Holst
Published in: Technology Innovation Management Review, Issue 7(2), 2017, Page(s) 27-34, ISSN 1927-0321
Publisher: Talent First Network 2007–2017

Analysis of Fingerprinting Techniques for Tor Hidden Services

Author(s): A. Panchenko, A. Mitseva, M. Henze, F. Lanze, K. Wehrle, T. Engel
Published in: Workshop on Privacy in the Electronic Society (WPES’17), 2017, ISBN 978-1-4503-5175-1
Publisher: ACM

Crowdsourcing Mechanisms in the Privacy Flag Framework

Author(s): I.P. Chochliouros, A. Kostopoulos, A.S. Spiliopoulou, S. Ziegler, L. Ladid, N. Alonistioti, M. Belesioti, S. Nikoletseas, V. Vlachos, N. Gligoric, A. Stahlbrost, L. Bolognini, E. Vasilaki, D. Arvanitozisis and E. Sfakianakis.
Published in: Proceedings of the EuCNC-2018, 2018, Page(s) 1-5, ISBN 978-1-5386-1478-5
Publisher: IEEE, Jozef Stefan Institute, Slovenia, in cooperation with the European Commission

Privacy Flag - A crowdsourcing platform for reporting and managing privacy and security risks

Author(s): Vasileios Vlachos, Yannis C. Stamatiou, Adelina Madhja, Sotiris Nikoletseas
Published in: Proceedings of the 21st Pan-Hellenic Conference on Informatics - PCI 2017, 2017, Page(s) 1-4, ISBN 9781-450353557
Publisher: ACM Press
DOI: 10.1145/3139367.3139432

Enabling Crowd-sourcing-based Privacy Risk Assessment in EU - the Privacy Flag Project

Author(s): Ioannis Chochliouros, Marita Holst, Sébastien Ziegler, Luca Bolognini, Nancy Alonistioti, Makis Stamatelatos, Panagiotis Kontopoulos, George Mourikas, Vasileios Vlachos, Nenad Gligoric
Published in: Proceedings of the 21st Pan-Hellenic Conference on Informatics - PCI 2017, 2017, Page(s) 1-2, ISBN 9781-450353557
Publisher: ACM Press
DOI: 10.1145/3139367.3139417

Enhancing Privacy Using Crowdsourcing Mechanisms

Author(s): Alexandros Kostopoulos, Ioannis Chochliouros, Ioanna Papafili, Andreas Drakos
Published in: Proceedings of the 21st Pan-Hellenic Conference on Informatics - PCI 2017, 2017, Page(s) 1-5, ISBN 9781-450353557
Publisher: ACM Press
DOI: 10.1145/3139367.3139405

Enabling Privacy Protection by using a Universal Privacy Risk Methodology in the context of 5G

Author(s): Ioannis P. Chochliouros, Evangelos Sfakianakis, Maria Belesioti, Nikolaos Bompetsis and Anastasia S. Spiliopoulou
Published in: Proceedings of the EuCNC-2016 (The European Conference on Networks and Communication 2016), 2016, Page(s) 1-5
Publisher: European Commission in cooperation with the Natinal technical University of Athens, Greece and the University of Piraeus, Greece

A Formalization of Fingerprinting Techniques

Author(s): Fabian Lanze, Andriy Panchenko, Thomas Engel
Published in: 2015 IEEE Trustcom/BigDataSE/ISPA, Issue Vol.1, 2015, Page(s) 818-825, ISBN 978-1-4673-7952-6
Publisher: IEEE
DOI: 10.1109/Trustcom.2015.452

On the Impact of Cross-Layer Information Leakage on Anonymity in Crowds

Author(s): Andriy Panchenko
Published in: Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks - Q2SWinet '15, 2015, Page(s) 35-42, ISBN 9781-450337571
Publisher: ACM Press
DOI: 10.1145/2815317.2815325

Privacy Flag – Collective Privacy Protection Scheme Based on Structured Distributed Risk Assessment

Author(s): S. Ziegler, I. Chochliouros and L. Ladid
Published in: Proceedings of the IEEE World Forum for Internet of Things 2015; Special Session on IoT Security & Privacy, 2015
Publisher: IEEE IoT World Forum

Website Fingerprinting at Internet Scale

Author(s): Panchenko A., Lanze F., Zinnen A., Henze M., Pennekamp J., Wehrle K. and Engel T.
Published in: Proceedings of the Internet Society (ISOC) Network and Distributed System Security Symposium - (NDSS-2016), 2016, Page(s) 1-15, ISBN 1-891562-41-X
Publisher: ISOC
DOI: 10.14722/ndss.2016.23477

Bringing your data everywhere in the Internet of (every)Thing: a legal reading of the new right to portability

Author(s): Bistolfi C., Scudiero L. and Ziegler S.
Published in: Proceedings of the AINA-2016 (The 30th IEEE International Conference on Advanced Information Networking and Applications), 2016, Page(s) 1-4
Publisher: IEEE

Facebook Users Attitudes towards Secondary Use of Personal Information

Author(s): Ali Padyab, Tero Päivärinta, Anna Ståhlbröst, Birgitta Bergvall-Kåreborn
Published in: Proceedings of the International Conference on Information Systems 2016 (ICIS-2016), 2016, ISBN 978-0-9966831-3-5
Publisher: AIS Electronic Library (AISeL)

POSTER - Fingerprinting Tor Hidden Services

Author(s): Asya Mitseva, Andriy Panchenko, Fabian Lanze, Martin Henze, Klaus Wehrle, Thomas Engel
Published in: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16, 2016, Page(s) 1766-1768, ISBN 9781-450341394
Publisher: ACM Press
DOI: 10.1145/2976749.2989054

Ensuring Privacy in 5G-Networks

Author(s): Alexandros Kostopoulos, Ioannis Chochliouros, Ioanna Papafili and Andreas Drakos
Published in: Proccedings of the EuCNC-2017, 2017, Page(s) 1-5
Publisher: University of Oulu, Finland, in cooperation with the European Commission

Crowd Sourcing Based Privacy Threat Analysis and Alerting

Author(s): Adelina Madia, Sotiris Nikoletseas, Ioannis Stamatiou, Dimitrios Tsolovos, Vasileios Vlachos
Published in: Proccedings of the 3rd International Conference on Cryptography, Cyber Security and Information Warfare (3rd CryCybIW), 2017
Publisher: Hellenic Military Academy

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available