IAB Workshop on Internet Privacy (privacyws)
Slides
Title | Abstract | Curr. rev. | Date | Last presented | On agenda |
---|---|---|---|---|---|
Slides: What are our conclusions? What is the take-home work? | Slides: What are our conclusions? What is the take-home work? by Hannes Tschofenig, and Thomas Roessler |
00 | 2023-02-13 | ||
Slides: Privacy Considerations for Internet Protocols | Slides: Privacy Considerations for Internet Protocols by Alissa Cooper |
00 | 2023-02-13 | ||
Slides: Security in the IETF | Slides: Security in the IETF by Russ Housley |
00 | 2023-02-13 | ||
Slides: A Simplistic View of Internet Privacy | Slides: A Simplistic View of Internet Privacy by Lucy Lynch |
00 | 2023-02-13 | ||
Slides: Privacy at W3C | Slides: Privacy at W3C by Thomas Roessler |
00 | 2023-02-13 | ||
Slides: IETF & Privacy | Slides: IETF & Privacy by Jon Peterson |
00 | 2023-02-13 | ||
Slides: Workshop Outputs and Goals | Slides: Workshop Outputs and Goals by Hannes Tschofenig |
00 | 2023-02-13 | ||
Safebook: Privacy Preserving Online Social Network | Safebook: Privacy Preserving Online Social Network by L. Antonio Cutillo, R. Molva, and M. Önen |
00 | 2023-02-13 | ||
Effective Device API Privacy: Protecting Everyone (Not Just the User) | Effective Device API Privacy: Protecting Everyone (Not Just the User) by Susan Landau |
00 | 2023-02-13 | ||
eduroam – a world-wide network access roaming consortium on the edge of preserving privacy vs. identifying users | eduroam – a world-wide network access roaming consortium on the edge of preserving privacy vs. identifying users by Stefan Winter |
00 | 2023-02-13 | ||
Saveface: Save George’s faces in Social Networks where Contexts Collapse | Saveface: Save George’s faces in Social Networks where Contexts Collapse by Fuming Shih and Sharon Paradesi |
00 | 2023-02-13 | ||
Mobility and Privacy | Mobility and Privacy by S. Brim, M. Linsner, B. McLaughlin, and K. Wierenga |
00 | 2023-02-13 | ||
Adding Privacy in Existing Security Systems | Adding Privacy in Existing Security Systems by Sam Hartman |
00 | 2023-02-13 | ||
Several Pressing Problems in Hypertext Privacy | Several Pressing Problems in Hypertext Privacy by Peter Eckersley |
00 | 2023-02-13 | ||
Personal Data Service | Personal Data Service by Paul Trevithick |
00 | 2023-02-13 | ||
HTTPa: Accountable HTTP | HTTPa: Accountable HTTP by Oshani Seneviratne and Lalana Kagal |
00 | 2023-02-13 | ||
Location Privacy in Next Generation Internet Architectures | Location Privacy in Next Generation Internet Architectures by Oliver Hanka |
00 | 2023-02-13 | ||
Facilitate, don’t mandate | Facilitate, don’t mandate by Ari Rabkin, Nick Doty and Deirdre K. Mulligan |
00 | 2023-02-13 | ||
Position Paper: Incentives for Adoption of Machine-Readable Privacy Notices | Position Paper: Incentives for Adoption of Machine-Readable Privacy Notices by Lorrie Cranor |
00 | 2023-02-13 | ||
TRUSTe Position Paper | TRUSTe Position Paper by Kevin Trilli |
00 | 2023-02-13 | ||
Everything we thought we knew about privacy is wrong | Everything we thought we knew about privacy is wrong by Kasey Chappelle and Dan Appelquist |
00 | 2023-02-13 | ||
Location Privacy Protection Through Obfuscation | Location Privacy Protection Through Obfuscation by Jorge Cuellar |
00 | 2023-02-13 | ||
Do Not Track: Universal Web Tracking Opt-out | Do Not Track: Universal Web Tracking Opt-out by Jonathan Mayer and Arvind Narayanan |
00 | 2023-02-13 | ||
On Technology and Internet Privacy | On Technology and Internet Privacy by John Linn |
00 | 2023-02-13 | ||
Protocols are for sharing | Protocols are for sharing by John Kemp |
00 | 2023-02-13 | ||
Trusted Intermediaries as Privacy Agents | Trusted Intermediaries as Privacy Agents by Jim Fenton |
00 | 2023-02-13 | ||
Privacy Preservation Techniques to establish Trustworthiness for Distributed, Inter-Provider Monitoring | Privacy Preservation Techniques to establish Trustworthiness for Distributed, Inter-Provider Monitoring by J. Seedorf, S. Niccolini, A. Sarma, B. Trammell, and G. Bianchi |
00 | 2023-02-13 | ||
Privicons: A approach to communicating privacy preferences between Users | Privicons: A approach to communicating privacy preferences between Users by E. Forrest and J. Schallaböck |
00 | 2023-02-13 | ||
I ‘like’ you, but I hate your apps | I ‘like’ you, but I hate your apps by Ian Glazer |
00 | 2023-02-13 | ||
Position Paper for Internet Privacy Workshop | Position Paper for Internet Privacy Workshop by Heather West |
00 | 2023-02-13 | ||
Internet Privacy Workshop Position Paper: Privacy and Device APIs | Internet Privacy Workshop Position Paper: Privacy and Device APIs by Frederick Hirsch |
00 | 2023-02-13 | ||
Privacy by Design: The 7 Foundational Principles – Implementation and Mapping of Fair Information Practices | Privacy by Design: The 7 Foundational Principles – Implementation and Mapping of Fair Information Practices by Fred Carter and Ann Cavoukian |
00 | 2023-02-13 | ||
Can We Have a Usable Internet Without User Trackability? | Can We Have a Usable Internet Without User Trackability? by Eric Rescorla |
00 | 2023-02-13 | ||
Privacy on the Internet | Privacy on the Internet by Dorothy Gellert |
00 | 2023-02-13 | ||
Privacy Approaches for Internet Video Advertising | Privacy Approaches for Internet Video Advertising by Dave Maher |
00 | 2023-02-13 | ||
Using properties of physical phenomena and information flow control to manage privacy | Using properties of physical phenomena and information flow control to manage privacy by David Evans and David M. Eyers |
00 | 2023-02-13 | ||
Joint Privacy Workshop: Position Comments by D. Crocker | Joint Privacy Workshop: Position Comments by D. Crocker by Dave Crocker |
00 | 2023-02-13 | ||
Incentives for Privacy | Incentives for Privacy by Cullen Jennings |
00 | 2023-02-13 | ||
Why Private Browsing Modes Do Not Deliver Real Privacy | Why Private Browsing Modes Do Not Deliver Real Privacy by Christopher Soghoian |
00 | 2023-02-13 | ||
Privacy-preserving identities for a safer, more trusted internet | Privacy-preserving identities for a safer, more trusted internet by Christian Paquin |
00 | 2023-02-13 | ||
Protection-by-Design: Enhancing ecosystem capabilities to protect personal information | Protection-by-Design: Enhancing ecosystem capabilities to protect personal information by Jonathan Fox and Brett McDowell |
00 | 2023-02-13 | ||
Addressing Identity on the Web | Addressing Identity on the Web by Blaine Cook |
00 | 2023-02-13 | ||
An architecture for privacy-enabled user profile portability on the Web of Data | An architecture for privacy-enabled user profile portability on the Web of Data by Benjamin Heitmann and Conor Hayes |
00 | 2023-02-13 | ||
I Know What You Will Do Next Summer | I Know What You Will Do Next Summer by Balachander Krishnamurthy |
00 | 2023-02-13 | ||
Web Crawlers and Privacy: The Need to Reboot Robots.txt | Web Crawlers and Privacy: The Need to Reboot Robots.txt by Arvind Narayanan and Pete Warden |
00 | 2023-02-13 | ||
SocialKeys: Transparent Cryptography via Key Distribution over Social Networks | SocialKeys: Transparent Cryptography via Key Distribution over Social Networks by Arvind Narayanan |
00 | 2023-02-13 | ||
Toward Objective Global Privacy Standards | Toward Objective Global Privacy Standards by Ari Schwartz |
00 | 2023-02-13 | ||
Thoughts on Adding “Privacy Considerations” to Internet Drafts | Thoughts on Adding “Privacy Considerations” to Internet Drafts by Alissa Cooper, and John Morris |
00 | 2023-02-13 | ||
Addressing the privacy management crisis in online social networks | Addressing the privacy management crisis in online social networks by Krishna Gummadi, Balachander Krishnamurthy, and Alan Mislove |
00 | 2023-02-13 | ||
Minutes of the IAB/W3C/ISOC/MIT Internet Privacy Workshop | Minutes of the IAB/W3C/ISOC/MIT Internet Privacy Workshop | 00 | 2023-02-13 |