Simone Fischer-Hübner
#94,542
Most Influential Person Now
Researcher
Simone Fischer-Hübner's AcademicInfluence.com Rankings
Simone Fischer-Hübnercomputer-science Degrees
Computer Science
#10401
World Rank
#10922
Historical Rank
Operating Systems
#22
World Rank
#23
Historical Rank
Information Security
#26
World Rank
#26
Historical Rank
Software Engineering
#352
World Rank
#358
Historical Rank
Download Badge
Computer Science
Simone Fischer-Hübner's Degrees
- PhD Computer Science University of Hamburg
- Masters Computer Science University of Hamburg
- Bachelors Computer Science University of Hamburg
Similar Degrees You Can Earn
Why Is Simone Fischer-Hübner Influential?
(Suggest an Edit or Addition)According to Wikipedia, Simone Fischer-Hübner is an expert on IT security and personal integrity and a professor at the Department of Computer Science at Karlstad University. Fischer-Hübner has been a member of the Cyber Security Council at the Swedish Civil Contingencies Agency since 2011. Moreover, she is the Swedish representative and vice chair of IFIP Technical Committee 11 on Information Security and Privacy, board member of the Swedish Forum för Dataskydd, advisory board member of PETS and NordSec, and coordinator of the Swedish IT Security Network for PhD Students .
Simone Fischer-Hübner's Published Works
Published Works
- Anonymity , Unlinkability , Unobservability , Pseudonymity , and Identity Management – A Consolidated Proposal for Terminology (2002) (234)
- Privacy and identity management for everyone (2005) (116)
- IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms (2001) (102)
- Accountability for cloud and other future Internet services (2012) (80)
- Making PRIME usable (2005) (76)
- Probabilistic Analysis (2009) (71)
- Tools for Achieving Usable Ex Post Transparency: A Survey (2017) (69)
- Usable Transparency with the Data Track: A Tool for Visualizing Data Disclosures (2015) (64)
- Pseudonymous audit for privacy enhanced intrusion detection (1997) (64)
- IT-Security and Privacy (2001) (63)
- From a Formal Privacy Model to its Implementation (1998) (58)
- Audit Trail (2020) (52)
- Towards Usable Privacy Policy Display & Management for PrimeLife (2012) (45)
- Security and Privacy in Dynamic Environments (2006) (45)
- How can Cloud Users be Supported in Deciding on, Tracking and Controlling How their Data are Used? (2013) (41)
- Transparency, Privacy and Trust - Technology for Tracking and Controlling My Data Disclosures: Does This Work? (2016) (40)
- Evoking Comprehensive Mental Models of Anonymous Credentials (2011) (35)
- Policies and Research in Identity Management - First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007 (2008) (27)
- Privacy and security at risk in the global information society (1998) (27)
- Outlining “Data Track”: Privacy-friendly Data Maintenance for End-users (2007) (26)
- Privacy and Identity Management for the Future Internet in the Age of Globalisation (2015) (25)
- Future Challenges in Security and Privacy for Academia and Industry (2011) (25)
- Blocking attacks on SIP VoIP proxies caused by external processing (2010) (24)
- The Dilemma of User Engagement in Privacy Notices (2020) (22)
- mHealth: A Privacy Threat Analysis for Public Health Surveillance Systems (2018) (20)
- Trust and Assurance HCI (2011) (19)
- Revealing the Calling History of SIP VoIP Systems by Timing Attacks (2009) (18)
- Visualizing Exports of Personal Data by Exercising the Right of Data Portability in the Data Track - Are People Ready for This? (2016) (17)
- Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061) (2011) (17)
- HCI for Policy Display and Administration (2011) (17)
- Mobile Health Systems for Community-Based Primary Care: Identifying Controls and Mitigating Privacy Threats (2019) (16)
- Enhancing Privacy Controls for Patients via a Selective Authentic Electronic Health Record Exchange Service: Qualitative Study of Perspectives by Medical Professionals and Patients (2018) (16)
- Helping john to make informed decisions on using social login (2018) (14)
- Towards Usable Privacy Policy Display & Management - The PrimeLife Approach (2011) (14)
- Benefits of Privacy-Enhancing Identity Management (2008) (14)
- Privacy for Peer Profiling in Collective Adaptive Systems (2014) (14)
- End User Transparency Tools : UI Prototypes (2010) (14)
- Detecting Near-Duplicate SPITs in Voice Mailboxes Using Hashes (2011) (13)
- Towards a New Paradigm for Privacy and Security in Cloud Services (2015) (13)
- Privacy Impact Assessment Template for Provenance (2016) (12)
- Tools for Cloud Accountability: A4Cloud Tutorial (2014) (11)
- Using Guesswork as a Measure for Confidentiality of Selectively Encrypted Messages (2006) (11)
- Automatic Abstracting (2009) (11)
- E-Consent for Data Privacy: Consent Management for Mobile Health Technologies in Public Health Surveys and Disease Surveillance (2019) (11)
- Chameleon and the Identity-Anonymity Paradox: Anonymity in Mobile Ad Hoc Networks (2006) (11)
- Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider (2016) (10)
- The Users' Mental Models' Effect on their Comprehension of Anonymous Credentials (2011) (10)
- Usable Security und Privacy (2010) (10)
- Usable Transparency Enhancing Tools : A Literature Review (2017) (10)
- Stakeholder perspectives and requirements on cybersecurity in Europe (2021) (10)
- Surveillance and Privacy (2010) (10)
- Privacy and Social Values in Smart Cities (2017) (10)
- Crime and Punishment in the Cloud Accountability, Transparency, and Privacy (2013) (10)
- Privacy Enhancing Technologies - 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings (2011) (9)
- To Be, or Not to Be Notified - Eliciting Privacy Notification Preferences for Online mHealth Services (2019) (9)
- Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks (2010) (9)
- Trusted Server Model for Privacy-Enhanced Location Based Services (2006) (9)
- Privacy and Anonymity in Mobile Ad Hoc Networks (2008) (8)
- Privacy-Preserving Identifiers for IoT: A Systematic Literature Review (2020) (8)
- Protein Sequence (2009) (8)
- The Future of Identity in the Information Society - 4th IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papers (2009) (8)
- Policies and Research in Identity Management (2013) (7)
- How ordinary internet users can have a chance to influence privacy policies (2006) (7)
- Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data (2018) (7)
- User Evaluations of an App Interface for Cloud-Based Identity Management (2018) (7)
- Making secret sharing based cloud storage usable (2019) (7)
- Privacy in Social Collective Intelligence Systems (2014) (7)
- On the security, privacy and usability of online seals : An overview (2013) (7)
- Requirements for Privacy-Enhancements in Mobile Ad Hoc Networks (2005) (6)
- Privacy in the Global Information Society (2001) (6)
- Fingerprint Recognition on Mobile Devices: Widely Deployed, Rarely Understood (2018) (6)
- Automated Log Audits for Privacy Compliance Validation: A Literature Survey (2015) (6)
- Audio Feature Extraction (2009) (6)
- The legal status of malleable- and functional signatures in light of Regulation (EU) No 910/2014 (2015) (6)
- Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements (2015) (6)
- Combining Verified and Adaptive System Components Towards More Secure Computer Architectures (1990) (6)
- Privacy and Identity Management for Life - 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers (2011) (5)
- HCI Requirements for Transparency and Accountability Tools for Cloud Service Chains (2014) (5)
- Pattern Discovery (2004) (5)
- Vision: A Noisy Picture or a Picker Wheel to Spin? Exploring Suitable Metaphors for Differentially Private Data Analyses (2021) (5)
- Assessments of a Cloud-Based Data Wallet for Personal Identity Management (2017) (5)
- mCrowds : Anonymity for the Mobile Internet (2003) (4)
- Measuring Confidentiality of Selectively Encrypted Messages Using Guesswork (2005) (4)
- Stakeholders’ Perspectives on Malleable Signatures in a Cloud-based eHealth Scenario (2016) (4)
- Privacy and Identity Management. The Smart Revolution (2017) (4)
- Privacy and Identity Management. Facing up to Next Steps (2016) (4)
- Approaches to Integrated Malware Detection and Avoidance (2001) (4)
- Final HCI Research Report (2013) (4)
- On the security, privacy and usability of online seals (2013) (4)
- Understanding the user experience of secure mobile online transactions in realistic contexts of use (2012) (4)
- Ontology-Based Obfuscation and Anonymisation for Privacy - A Case Study on Healthcare (2015) (4)
- Roadmap for NIS education programmes in Europe (2014) (4)
- A survey on anonymous voice over IP communication: attacks and defenses (2014) (3)
- Timing Attacks on PIN Input in VoIP Networks (Short Paper) (2011) (3)
- Privacy at risk in the global information society (1997) (3)
- Accountability Through Transparency for Cloud Customers (2015) (3)
- Machine Learning-Based Analysis of Encrypted Medical Data in the Cloud: Qualitative Study of Expert Stakeholders' Perspectives. (2020) (3)
- Exploring User-Suitable Metaphors for Differentially Private Data Analyses (2022) (3)
- Human-Computer Interaction (2011) (3)
- Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden (2006) (3)
- Privacy Enhancing Technologies : 12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012, Proceedings (2012) (3)
- Addressing Vulnerability and Privacy Problems generated by the Use of IT-Security Mechanisms (1992) (3)
- PRIME Framework V3 (2008) (3)
- Secure and Privacy-Friendly Storage and Data Processing in the Cloud (2017) (3)
- EDUCATING SYSTEM TESTERS IN VULNERABILITY ANALYSIS Laboratory Development and Deployment (2005) (3)
- SIP Proxies: New Reflectors in the Internet (2010) (3)
- Reconciling the what, when and how of privacy notifications in fitness tracking scenarios (2021) (3)
- A MOOC on Privacy by Design and the GDPR (2018) (3)
- The Future of Identity in the Information Society - Proceedings of the Third IFIP WG 9.2, 9.6/ 11.6, 11.7/FIDIS International Summer School on The Future of Identity in the Information Society, Karlstad University, Sweden, August 4-10, 2007 (2008) (3)
- Usable Privacy-Enhancing Identity Management: Challenges and Approaches (2010) (3)
- Using PAPAYA for eHealth - Use Case Analysis and Requirements (2020) (3)
- Trust in Prime Proceedings of the 5th IEEE International Symposium on Signal Processing and IT (2005) (3)
- Organisational Privacy Culture and Climate: A Scoping Review (2022) (2)
- Self-Regulation and Democracy: Choice and Limits? (1999) (2)
- Performance Benchmark (2009) (2)
- Firewall Usability and Visualization : A Systematic Literature Review (2016) (2)
- Symbolic and Structuring Effects of the Internet on Privacy (2005) (2)
- Self-Determination in Mobile Internet: PiMI Prototype Results (2002) (2)
- Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings (2009) (1)
- A survey on anonymous voice over IP communication: attacks and defenses (2019) (1)
- Trust, Privacy and Security in Digital Business (2015) (1)
- Quality Criteria for Cyber Security MOOCs (2020) (1)
- Crime and Punishment in the Cloud (2013) (1)
- Privacy and Identity Management for Life - 5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School, Nice, France, September 7-11, 2009, Revised Selected Papers (2010) (1)
- Identity Deployment and Management in Wireless Mesh Networks (2007) (1)
- Towards a Privacy Impact Assessment Template for Mobile Health Data Collection Systems (2016) (1)
- Opportunities and Challenges of Dynamic Consent in Commercial Big Data Analytics (2019) (1)
- Trust, privacy, and security in digital Business : Third International Conference, TrustBus 2006, Kraków, Poland, September 2006 : proceedings (2006) (1)
- IFIP Advances in Information and Communication Technology: Preface (2012) (1)
- The Smart World Revolution (2018) (1)
- Transparency Enhancing Tools a HCI for Policy Display and Informed Consent (2011) (1)
- Preventing Privacy Attacks and CyberCrime in the Mobile Internet? (2002) (1)
- Analysing Drivers' Preferences for Privacy Enhancing Car-to-Car Communication Systems: A Study from South-Africa (2020) (1)
- HCI Patterns for Cryptographically Equipped Cloud Services (2018) (1)
- Das Virus-Test-Centrum and der Universität Hamburg (1989) (1)
- Overview of Privacy Challenges in Mobile Health Data Collection Systems (2018) (1)
- Privacy and identity management. The smart evolution: 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, revised selected papers (2018) (1)
- D:D-5.3 User-Centric Transparency Tools V2 (2015) (1)
- Policies and Research in Identity Management : Third IFIP WG 11.6 Working Conference, IDMAN 2013 (2013) (1)
- Counteract DNS Attacks on SIP Proxies Using Bloom Filters (2013) (1)
- Risks on the way to the global information society (1996) (1)
- Anonymity in Location-Based Services (2009) (1)
- Privacy and Identity Management for Life : 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, Revised Selected Papers (2012) (1)
- Secure IT Systems (2014) (1)
- Ontology-Based Obfuscation and Anonymisation for Privacy (2019) (1)
- Towards Anonymity in Mobile Ad Hoc Networks The Chameleon Protocol and its Anonymity Analysis (2006) (1)
- The global information society and electronic commerce: Privacy threats and privacy technologies (1998) (0)
- Machine Learning Based Analysis of Encrypted Medical Data In The Cloud: A Qualitative Study of Expert Stakeholders’ Perspectives (Preprint) (2020) (0)
- Edinburgh Research Explorer SmartSociety: Collaboration Between Humans and Machines, Promises and Perils (2018) (0)
- Towards Cybersecurity MOOC Certification (2021) (0)
- Positive Infinity (2020) (0)
- Patterns in Privacy - A Pattern-Based Approach for Assessments (2019) (0)
- Mobile Health Systems for Community-Based Primary Care: Identifying Controls and Mitigating Privacy Threats (Preprint) (2018) (0)
- Appendix B: Implementation of a Hospital Scenario as a Demonstration Example (2001) (0)
- Privacy-Preserving Access Control in Publicly Readable Storage Systems (2019) (0)
- The Future of Identity in the Information Society 4th IFIP / FIDIS International Summer School (2009) (0)
- PARALLEL PUBLISHED VERSION / SELF-ARCHIVED VERSION OF THE OF THE ORIGINAL ARTICLE (2020) (0)
- Pattern Based Clustering (2009) (0)
- Identity-Theft Through e-Government Services – Government to Pay the Bill? (2019) (0)
- Chapter 5: The problem space and Chapter 6: An Holistic Approach to Privacy-Enhancements (2007) (0)
- Trust, Privacy and Security in Digital Business : 9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012. Proceedings (2012) (0)
- Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, ... Federation for Information Processing) (2006) (0)
- An Experience with a De-identifying Task to Inform About Privacy Issues (2019) (0)
- Implications of Privacy & Security Research for the Upcoming Battlefield of Things (2019) (0)
- Adaptive Metric Techniques (2009) (0)
- Teaching Privacy as a Part of the Computer Science Curriculum (1996) (0)
- Requirements for Privacy in Mobile Ad Hoc Networks (2005) (0)
- Anonymity (2009) (0)
- Roadmap for NIS education programmes in Europe: education (2014) (0)
- Example: on online movie store (2006) (0)
- Chapter 6: Application Scenario: An Online Movie Store (2006) (0)
- Proceedings of the IFIP TC9/WG9.6 Working Conference on Security and Control of Information Technology in Society on board M/S Illich and ashore (1993) (0)
- A Task-Based Privacy Model (2001) (0)
- Privacy-Enhancing Technologies (2009) (0)
- Digital personae and profiles as representations of individuals (2017) (0)
- A Brief Evaluation of Icons in the First Reading of the European Parliament on COM (2012) 0011 (2020) (0)
- Mitigate DNS self-reflecting attacks on SIP proxies Final Project Report for Internetfonden ( . SE ) , 12 October 2012 (2012) (0)
- Adversarial Information Retrieval (2009) (0)
- Focused Formal Model of Authorization for Data Modeled using Semantic Web Technologies (2017) (0)
- Applications of Privacy and Security Research in the Upcoming Battlefield of Things (2018) (0)
- Trust and Privacy in Digital Business, Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings (2006) (0)
- Members of the PrimeLife Consortium (2011) (0)
- Anonymity Online – Current Solutions and Challenges (2021) (0)
- A survey on anonymous voice over IP communication: attacks and defenses (2019) (0)
- Peer Data Management (2009) (0)
- The Day at St Petersburg (1993) (0)
- Capturing drivers' privacy preferences for intelligent transportation systems: An intercultural perspective (2022) (0)
- Evidence-Based Security and Privacy Assurance in Cloud Ecosystems (2019) (0)
- Special issue: TrustBus 2006 (2007) (0)
- Ontology-based Obfuscation and Anonymisation for Privacy : A Case Study on Healthcare (2016) (0)
- On the Cutting Edge between Privacy and Security (1993) (0)
- A Privacy Focused Formal Model of Authorization for Data Modeled using Semantic Web Technologies (2017) (0)
- Privacy in Speech and Language Technology (Dagstuhl Seminar 22342) (2022) (0)
- Privacy in Speech and Language Technology (2023) (0)
- Uncertain Information (2009) (0)
- Adaptive Database Replication (2009) (0)
- Privacy and Identity Management. Time for a Revolution? (2016) (0)
- Specification and Implementation of the Privacy Policy Following the Generalised Framework for Access Control- Approach (2001) (0)
- Census 2011 and Privacy (2011) (0)
- Enhanced Assurance About Cloud Service Provision Promises (2019) (0)
- Appendix A: Formal Mathematical Privacy Model (2001) (0)
- Manuscript: A Qualitative Study on Homomorphic Encryption in eHealth (2019) (0)
- THE FUTURE OF IDENTITY (2012) (0)
- Detecting illegal system calls using a data-oriented detection model (2018) (0)
- Privacy Labelling and the Story of Princess Privacy and the Seven Helpers (2020) (0)
- An Authorization Model for Data Modeled Using Semantic Web Technologies (2017) (0)
- PRIME Framework V2 (2006) (0)
- Meeting the Global Challenges of Security Incident Response (2004) (0)
- Developing a Structured Metric to Measure Privacy Risk in Privacy Impact Assessments (2019) (0)
- Exploring Trust, Security and Privacy in Digital Business (2009) (0)
- Experiences from Educating Practitioners in Vulnerability Analysis (2007) (0)
- Privacy for Reporters of Human Rights Abuses: Identity and Anonymity in Mobile Networks (2011) (0)
- Pixel Classification (2009) (0)
This paper list is powered by the following services:
Other Resources About Simone Fischer-Hübner
What Schools Are Affiliated With Simone Fischer-Hübner?
Simone Fischer-Hübner is affiliated with the following schools: