Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Enabling Crowd-sourcing based privacy protection for smartphone applications, websites and Internet of Things deployments

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

UPRAAMs and in-depth risk analysis modelling report - updated (opens in new window)
Final integration test and validation report (opens in new window)

Deliverable 5.3: Final integration test and validation report

Technical risks analysis report (opens in new window)

D2.2: Technical risks analysis report

Updated Architecture Design (opens in new window)

Deliverable 1.3: Updated Architecture Design

Initial test and validation report (opens in new window)

Deliverable 5.2: Initial test and validation report

Integration, tests and validation plan (opens in new window)

Deliverable 5.1: Integration, tests and validation plan

Second year report on Technical enablers development. (opens in new window)

Deliverable 4.2: Second year report on Technical enablers development.

Requirements Report (opens in new window)

Deliverable 1.1: Requirements Report

Initial Architecture Design (opens in new window)

Deliverable 1.2: Initial Architecture Design

Legal Framework Analysis Report (opens in new window)

D2.1: Legal Framework Analysis Report

Third year report on Technical enablers development (opens in new window)

Deliverable 4.3: Third year report on Technical enablers development.

Outreach and dissemination report - Year 1 (opens in new window)

Deliverable 6.2: Outreach and dissemination report - Year 1

Project presentation (opens in new window)

Deliverable 7.1: Project presentation Delivery date: M1; Nature: Report (R); Dissemination level: Public (PU); Deliverable Leader: MI.

First year report on Technical enablers development. (opens in new window)

Deliverable 4.1: First year report on Technical enablers development.

UPRAAMs and in-depth risk analysis modelling report (opens in new window)

D2.3: UPRAAMs and in-depth risk analysis modelling report

Outreach and dissemination report - Year 3 (opens in new window)

Deliverable 6.4: Outreach and dissemination report - Year 3

Outreach and dissemination report - Year 2 (opens in new window)

Deliverable 6.3: Outreach and dissemination report - Year 2

Final Architecture Design (opens in new window)

Deliverable 1.4: Final Architecture Design

Voluntary compliance commitment tool (fully operational) (opens in new window)

Deliverable 3.4: Voluntary compliance commitment tool (fully operational)

Initial version of knowledge base with privacy assessment (opens in new window)

Deliverable 5.4: Initial version of knowledge base with privacy assessment

Assessment tools final report (opens in new window)

Deliverable 3.5: Assessment tools final report

Data valuation tool fully operational (opens in new window)

Deliverable 3.1: Data valuation tool fully operational

Crowd-sourcing tools for risk assessment (fully operational) (opens in new window)

Deliverable 3.2: Crowd-sourcing tools for risk assessment (fully operational)

Publications

Safety-Aware Location Privacy in VANET: Evaluation and Comparison (opens in new window)

Author(s): Karim Emara
Published in: IEEE Transactions on Vehicular Technology, Issue 66/12, 2017, Page(s) 10718-10731, ISSN 0018-9545
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TVT.2017.2736885

Pseudonymization and impacts of Big (personal/anonymous) Data processing in the transition from the Directive 95/46/EC to the new EU General Data Protection Regulation (opens in new window)

Author(s): Luca Bolognini, Camilla Bistolfi
Published in: Computer Law & Security Review, Issue 33/2, 2017, Page(s) 171-181, ISSN 0267-3649
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.clsr.2016.11.002

Design of Smart City Systems from a Privacy Perspective

Author(s): Ståhlbröst, A., Padyab A., Sällström A. and Hollosi D.
Published in: IADIS International Journal on WWW/Internet, Issue 13, 2015, Page(s) 1-16, ISSN 1645-7641
Publisher: Universidade Aberta

Reflecting on Actions in Living Lab Research

Author(s): Anna Ståhlbröst, Marita Holst
Published in: Technology Innovation Management Review, Issue 7(2), 2017, Page(s) 27-34, ISSN 1927-0321
Publisher: Talent First Network 2007–2017

Analysis of Fingerprinting Techniques for Tor Hidden Services

Author(s): A. Panchenko, A. Mitseva, M. Henze, F. Lanze, K. Wehrle, T. Engel
Published in: Workshop on Privacy in the Electronic Society (WPES’17), 2017, ISBN 978-1-4503-5175-1
Publisher: ACM

Crowdsourcing Mechanisms in the Privacy Flag Framework

Author(s): I.P. Chochliouros, A. Kostopoulos, A.S. Spiliopoulou, S. Ziegler, L. Ladid, N. Alonistioti, M. Belesioti, S. Nikoletseas, V. Vlachos, N. Gligoric, A. Stahlbrost, L. Bolognini, E. Vasilaki, D. Arvanitozisis and E. Sfakianakis.
Published in: Proceedings of the EuCNC-2018, 2018, Page(s) 1-5, ISBN 978-1-5386-1478-5
Publisher: IEEE, Jozef Stefan Institute, Slovenia, in cooperation with the European Commission

Privacy Flag - A crowdsourcing platform for reporting and managing privacy and security risks (opens in new window)

Author(s): Vasileios Vlachos, Yannis C. Stamatiou, Adelina Madhja, Sotiris Nikoletseas
Published in: Proceedings of the 21st Pan-Hellenic Conference on Informatics - PCI 2017, 2017, Page(s) 1-4, ISBN 9781-450353557
Publisher: ACM Press
DOI: 10.1145/3139367.3139432

Enabling Crowd-sourcing-based Privacy Risk Assessment in EU - the Privacy Flag Project (opens in new window)

Author(s): Ioannis Chochliouros, Marita Holst, Sébastien Ziegler, Luca Bolognini, Nancy Alonistioti, Makis Stamatelatos, Panagiotis Kontopoulos, George Mourikas, Vasileios Vlachos, Nenad Gligoric
Published in: Proceedings of the 21st Pan-Hellenic Conference on Informatics - PCI 2017, 2017, Page(s) 1-2, ISBN 9781-450353557
Publisher: ACM Press
DOI: 10.1145/3139367.3139417

Enhancing Privacy Using Crowdsourcing Mechanisms (opens in new window)

Author(s): Alexandros Kostopoulos, Ioannis Chochliouros, Ioanna Papafili, Andreas Drakos
Published in: Proceedings of the 21st Pan-Hellenic Conference on Informatics - PCI 2017, 2017, Page(s) 1-5, ISBN 9781-450353557
Publisher: ACM Press
DOI: 10.1145/3139367.3139405

Enabling Privacy Protection by using a Universal Privacy Risk Methodology in the context of 5G

Author(s): Ioannis P. Chochliouros, Evangelos Sfakianakis, Maria Belesioti, Nikolaos Bompetsis and Anastasia S. Spiliopoulou
Published in: Proceedings of the EuCNC-2016 (The European Conference on Networks and Communication 2016), 2016, Page(s) 1-5
Publisher: European Commission in cooperation with the Natinal technical University of Athens, Greece and the University of Piraeus, Greece

A Formalization of Fingerprinting Techniques (opens in new window)

Author(s): Fabian Lanze, Andriy Panchenko, Thomas Engel
Published in: 2015 IEEE Trustcom/BigDataSE/ISPA, Issue Vol.1, 2015, Page(s) 818-825, ISBN 978-1-4673-7952-6
Publisher: IEEE
DOI: 10.1109/Trustcom.2015.452

On the Impact of Cross-Layer Information Leakage on Anonymity in Crowds (opens in new window)

Author(s): Andriy Panchenko
Published in: Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks - Q2SWinet '15, 2015, Page(s) 35-42, ISBN 9781-450337571
Publisher: ACM Press
DOI: 10.1145/2815317.2815325

Privacy Flag – Collective Privacy Protection Scheme Based on Structured Distributed Risk Assessment

Author(s): S. Ziegler, I. Chochliouros and L. Ladid
Published in: Proceedings of the IEEE World Forum for Internet of Things 2015; Special Session on IoT Security & Privacy, 2015
Publisher: IEEE IoT World Forum

Website Fingerprinting at Internet Scale (opens in new window)

Author(s): Panchenko A., Lanze F., Zinnen A., Henze M., Pennekamp J., Wehrle K. and Engel T.
Published in: Proceedings of the Internet Society (ISOC) Network and Distributed System Security Symposium - (NDSS-2016), 2016, Page(s) 1-15, ISBN 1-891562-41-X
Publisher: ISOC
DOI: 10.14722/ndss.2016.23477

Bringing your data everywhere in the Internet of (every)Thing: a legal reading of the new right to portability

Author(s): Bistolfi C., Scudiero L. and Ziegler S.
Published in: Proceedings of the AINA-2016 (The 30th IEEE International Conference on Advanced Information Networking and Applications), 2016, Page(s) 1-4
Publisher: IEEE

Facebook Users Attitudes towards Secondary Use of Personal Information

Author(s): Ali Padyab, Tero Päivärinta, Anna Ståhlbröst, Birgitta Bergvall-Kåreborn
Published in: Proceedings of the International Conference on Information Systems 2016 (ICIS-2016), 2016, ISBN 978-0-9966831-3-5
Publisher: AIS Electronic Library (AISeL)

POSTER - Fingerprinting Tor Hidden Services (opens in new window)

Author(s): Asya Mitseva, Andriy Panchenko, Fabian Lanze, Martin Henze, Klaus Wehrle, Thomas Engel
Published in: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16, 2016, Page(s) 1766-1768, ISBN 9781-450341394
Publisher: ACM Press
DOI: 10.1145/2976749.2989054

Ensuring Privacy in 5G-Networks

Author(s): Alexandros Kostopoulos, Ioannis Chochliouros, Ioanna Papafili and Andreas Drakos
Published in: Proccedings of the EuCNC-2017, 2017, Page(s) 1-5
Publisher: University of Oulu, Finland, in cooperation with the European Commission

Crowd Sourcing Based Privacy Threat Analysis and Alerting

Author(s): Adelina Madia, Sotiris Nikoletseas, Ioannis Stamatiou, Dimitrios Tsolovos, Vasileios Vlachos
Published in: Proccedings of the 3rd International Conference on Cryptography, Cyber Security and Information Warfare (3rd CryCybIW), 2017
Publisher: Hellenic Military Academy

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0