Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Helena Lindskog is active.

Publication


Featured researches published by Helena Lindskog.


information security | 2002

Self-Determination in Mobile Internet: PiMI Prototype Results

Simone Fischer-Hübner; Mikael Nilsson; Helena Lindskog

Mobile Internet environments will offer a whole new range of services that might revolutionize our way of life. However, with these new technologies and services new risks to the user’s privacy arise, and both legal and technical privacy safeguards are needed to protect the user. This paper discusses privacy and privacy risks in the mobile Internet and presents the result of the PiMI prototype project, in which one browser built-in, and one proxy-based P3P user agent for mobile Internet environments have been developed. The PiMI prototype enhances the users’ control over the dissemination of user and user device related information and thus protects their right for informational self determination.


HCC-6 Proceedings of the IFIP 17th World Computer Congress - TC9 Stream / 6th International Conference on Human Choice and Computers: Issues of Choice and Quality of Life in the Information Society | 2002

Preventing Privacy Attacks and CyberCrime in the Mobile Internet

Simone Fischer-Hübner; Alberto Escudero Pascual; Helena Lindskog

In the mobile Internet, personal privacy is increasingly endangered. Personal data such as traffic data, content data, location data and parameters for personalized or context-aware services are exposed at different network sites and can be easily condensed to extensive user profiles. At the same time, computer networks and electronic information may be used for committing cybercrime attacks. This panel session will discuss: Privacy risks and cybercrime threats in the Mobile Internet Legal approaches for protecting privacy in the Mobile Internet, such as the proposed EU Directive COM (2000) 385 on privacy in electronic communication for regulating the processing of traffic and location data, confidentiality of communication, cookies and spamming will be discussed Technical means for privacy protection by data minimization or avoidance (e.g., through flat rate billing or anonymisation of location data), or by informed user consent (e.g., through P3P) Conflicting interests and approaches on traffic data retention or preservation by law-enforcement authorities.


Archive | 2001

System and method for securing privacy of chat participants

Helena Lindskog; Mikael Nilsson


Archive | 2001

Mobile electronic transaction personal proxy

Helena Lindskog; Mikael Nilsson


Archive | 2003

Method and system for managing cookies according to a privacy policy

Helena Lindskog; Johan Hjelm; Peter Thörnqvist; Mikael Nilsson


Archive | 2003

Arrangement and a method relating to protection of end user data

Mikael Nilsson; Helena Lindskog


Archive | 2001

Method for signing documents using a PC and a personal terminal device

Janez Skubic; Paul W. Dent; Ben Smeets; Stefan Andersson; Mikael Nilsson; Helena Lindskog


Archive | 2000

Third party payment in e-commerce

Helena Lindskog; Mikael Nilsson


Archive | 2001

Method for limiting conveyance information of user profile within mobile internet transactions

Mikael Nilsson; Helena Lindskog; Simone Fischer-Hübner


Archive | 2002

Arrangement and method for protecting end user data

Helena Lindskog; Mikael Nilsson

Collaboration


Dive into the Helena Lindskog's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge