© 2017

Privacy Technologies and Policy

5th Annual Privacy Forum, APF 2017, Vienna, Austria, June 7-8, 2017, Revised Selected Papers

  • Erich Schweighofer
  • Herbert Leitold
  • Andreas Mitrakas
  • Kai Rannenberg
Conference proceedings APF 2017

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10518)

Also part of the Security and Cryptology book sub series (LNSC, volume 10518)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. Data Protection Regulation

    1. Front Matter
      Pages 1-1
    2. Jorge Bernal Bernabe, Antonio Skarmeta, Nicolás Notario, Julien Bringer, Martin David
      Pages 19-33
    3. Sourya Joyee De, Daniel Le Métayer
      Pages 52-83
  3. Neutralisation and Anonymization

    1. Front Matter
      Pages 85-85
    2. Andreas Rieb, Tamara Gurschler, Ulrike Lechner
      Pages 87-103
    3. Erich Schweighofer, Vinzenz Heussler, Peter Kieseberg
      Pages 104-119
    4. Maurizio Naldi, Giuseppe D’Acquisto
      Pages 120-140
    5. Paul Francis, Sebastian Probst Eide, Reinhard Munz
      Pages 141-158
  4. Privacy Policies in Practice

    1. Front Matter
      Pages 159-159
    2. Majed Alshammari, Andrew Simpson
      Pages 161-177
    3. Max Maass, Pascal Wichmann, Henning Pridöhl, Dominik Herrmann
      Pages 178-191
    4. Vasiliki Diamantopoulou, Konstantinos Angelopoulos, Julian Flake, Andrea Praitano, José Francisco Ruiz, Jan Jürjens et al.
      Pages 192-209
  5. Back Matter
    Pages 231-231

About these proceedings


This book constitutes the thoroughly refereed post-conference proceedings of the 5th Annual Privacy Forum, APF 2017, held in Vienna, Austria, in June 2017. The 12 revised full papers were carefully selected from 41 submissions on the basis of significance, novelty, and scientific quality. These selected papers are organized in three different chapters corresponding to the conference sessions. The first chapter, “Data Protection Regulation”, discusses topics concerning big genetic data, a privacy-preserving European identity ecosystem, the right to be forgotten und the re-use of privacy risk analysis. The second chapter, “Neutralisation and Anonymization”, discusses neutralisation of threat actors, privacy by design data exchange between CSIRTs, differential privacy and database anonymization. Finally, the third chapter, “Privacy Policies in Practice”, discusses privacy by design, privacy scores, privacy data management in healthcare and trade-offs between privacy and utility. 


Computer Science Informatics cryptography end-to-end security information privacy privacy by design user-centric security anonymity cloud computing e-waste economics of privacy education electronic communications legal aspects of privacy mobile health personal data security and privacy security-by-design

Editors and affiliations

  • Erich Schweighofer
    • 1
  • Herbert Leitold
    • 2
  • Andreas Mitrakas
    • 3
  • Kai Rannenberg
    • 4
  1. 1.Centre for Legal InformaticsUniversity of ViennaViennaAustria
  2. 2.A-SITGrazAustria
  3. 3.European Union Agency for Network and Information SecurityHeraklionGreece
  4. 4.Goethe University FrankfurtFrankfurtGermany

Bibliographic information

Industry Sectors
IT & Software