 
 
04-05 October 2010
Hosted by 

MIT, Cambridge (MA) 
Accepted Position Papers
- Privacy Data Envelops for Moving Privacy-sensitive Data
 by Armen Aghasaryan, Marie-Pascale Dupont, Stéphane Betgé-Brezetz and Guy-Bertrand Kamga, Alcatel-Lucent Bell Labs (FR)
- Simple Policy Negotiation for Location Disclosure
 by Nick Doty & Erik Wilde, School of Information UC Berkeley
- Prevention and Reaction: Defending Privacy in the Web 2.0
 by Michael Hart Rob Johnson, Stony Brook University
- UCDC: A User-Centric Disclosure Control Solution To Privacy Interoperability
 by Jim Lookabaugh & Erin Kenneally, intergreen.com & elchemy.org
- Some observations on privacy and DRMs
 by Betsy Masiello, Google Inc.
- Position Paper Deutsche Telekom, Group Privacy
 by Frank Wagner, Deutsche Telekom
- Respecting User Privacy in Cross-System Personalization
 by Yang Wang, Cylab Usable Privacy and Security (CUPS) Lab, Carnegie Mellon University
- Towards Supporting Contextual Privacy in Body Sensor Networks for Health Monitoring Service
 Fuming Shih, MIT CSAIL, Cambridge (MA) & Mi Zhang, Department of Electrical Engineering University of Southern California, Los Angeles
- Supporting User Privacy Preferences on Information Release in Open Scenarios
 C.A. Ardagna, S. De Capitani di Vimercati, S. Foresti, P. Samarati, DTI - Università degli Studi di Milano & S. Paraboschi, DIIMM - Università degli Studi di Bergamo
- PPL Engine: A Symmetric Architecture for Privacy Policy Handling
 Slim Trabelsi, Akram Njeh, SAP Labs France, Sophia Antipolis & Laurent Bussard, European Microsoft Innovation Center (EMIC) & Gregory Neven, IBM Zürich Research Center, Zürich
- Data Handling: Dependencies between Authorizations and Obligations
 Laurent Bussard, European Microsoft Innovation Center (EMIC) & Gregory Neven, IBM Zürich Research Center, Zürich & Jan Schallaböck, ULD, Kiel
- Distributed Privacy Policy Enforcement by using Sticky Policies
 David Chadwick & Kaniz Fatema, University of Kent
- Privacy and Policy in the DAP WG a DAP Perspective
 by Frederick Hirsch, DAP co-chair, Nokia & Robin Berjon, DAP co-chair, Vodafone
- Using Network Science To Understand and Apply Privacy Usage Controls
 by Erin Kenneally, Elchemy, Inc.
- The IdM card approach Increasing privacy and security in user-centric Identity Management
 Ronald Marx, Hervais Simo Fhom, Dirk Scheuermann, Kpatcha M. Bayarou, Fraunhofer SIT, Darmstadt
- A Usage Control (UCON) Model for Social Networks Privacy
 Jaehong Park & Ravi Sandhu, University of Texas at San Antonio, Institute for Cyber Security
- Controlling Data Usage with User-Managed Access (UMA)
 Eve Maler, Paypal
- Machine Interpretable Privacy Policies -- A fresh take on P3P
 Dave Raggett, W3C
- The Accountability Perspective
 Hal Abelson & Lalana Kagal, MIT CSAIL
- Distributed Management of Online Data
 JC Cannon, Microsoft