-
1
-
-
33846981890
-
Trust in PRIME
-
Athens, Greece
-
Andersson C, Camenisch J, Crane S, Fischer-Hübner S, Leenes R, Pearson S, Pettersson, JS, Sommer, D (2005) Trust in PRIME. In: Proceedings of the 5th IEEE Int. Symposium on Signal Processing and Information Technology. Athens, Greece, 552-559
-
(2005)
Proceedings of the 5th IEEE Int. Symposium on Signal Processing and Information Technology
, pp. 552-559
-
-
Andersson, C.1
Camenisch, J.2
Crane, S.3
Fischer-Hübner, S.4
Leenes, R.5
Pearson, S.6
Pettersson, J.S.7
Sommer, D.8
-
2
-
-
45949096532
-
-
Article 29 Working Party (2004) Opinion on More Harmonised Information Provisions. WP 100, 11987/04/EN. http://ec.europa.eu/justice_home/fsj/ privacy/docs/wpdocs/2004/wp100_en.pdf. Accessed 2 Dec 2007
-
Article 29 Working Party (2004) Opinion on More Harmonised Information Provisions. WP 100, 11987/04/EN. http://ec.europa.eu/justice_home/fsj/ privacy/docs/wpdocs/2004/wp100_en.pdf. Accessed 2 Dec 2007
-
-
-
-
3
-
-
33750687395
-
The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to Be Profiled Online for Personalization
-
Awad, NF, Krishnan, MS (2006) The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to Be Profiled Online for Personalization. MIS Quarterly 30 (1): 13-28
-
(2006)
MIS Quarterly
, vol.30
, Issue.1
, pp. 13-28
-
-
Awad, N.F.1
Krishnan, M.S.2
-
4
-
-
45949105993
-
-
Bauer M, Meints M, Hansen M (eds) (2005) Structured Overview on Prototypes and Concepts of Identity Management Systems. FIDIS Deliverable D3.1. Frankfurt am Main, Germany. http://www.fidis.net/ fileadmin/fidis/deliverables/fidis-wp3-del3.1.overview_on_ IMS.final.pdf. Accessed 2 Dec 2007
-
Bauer M, Meints M, Hansen M (eds) (2005) Structured Overview on Prototypes and Concepts of Identity Management Systems. FIDIS Deliverable D3.1. Frankfurt am Main, Germany. http://www.fidis.net/ fileadmin/fidis/deliverables/fidis-wp3-del3.1.overview_on_ IMS.final.pdf. Accessed 2 Dec 2007
-
-
-
-
5
-
-
35048824687
-
Law, PETs and Other Technologies for Privacy Protection
-
Accessed 2 Dec 2007
-
Borking JJ, Raab CD (2001) Law, PETs and Other Technologies for Privacy Protection. In: Journal of Information, Law and Technology, Vol. 1. http://www2.warwick.ac.uk/fac/soc/law/elj/jilt/2001_1/borking. Accessed 2 Dec 2007
-
(2001)
Journal of Information, Law and Technology
, vol.1
-
-
Borking, J.J.1
Raab, C.D.2
-
8
-
-
45949083022
-
-
Camenisch J, Lysyanskaya A (2000) Efficient Non-Transferable Anonymous Multi-Show Credential System With Optional Anonymity Revocation. IBM Research Report RZ 3295 (# 93341), extended abstract in: Advances in Cryptology - Eurocrypt 2001, revised full version available at http://eprint.iacr.org/2001/019. Accessed 2 Dec 2007
-
Camenisch J, Lysyanskaya A (2000) Efficient Non-Transferable Anonymous Multi-Show Credential System With Optional Anonymity Revocation. IBM Research Report RZ 3295 (# 93341), extended abstract in: Advances in Cryptology - Eurocrypt 2001, revised full version available at http://eprint.iacr.org/2001/019. Accessed 2 Dec 2007
-
-
-
-
9
-
-
33645678639
-
-
Trusted Systems Laboratory, HP Laboratories Bristol, HPL-2003-49, Accessed 2 Dec 2007
-
Casassa Mont M, Pearson S, Bramhall P (2003) Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services. Trusted Systems Laboratory, HP Laboratories Bristol, HPL-2003-49. http://www.hpl.hp.com/techreports/2003/HPL-2003-49.pdf. Accessed 2 Dec 2007
-
(2003)
Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services
-
-
Casassa Mont, M.1
Pearson, S.2
Bramhall, P.3
-
10
-
-
0022145479
-
Security without Identification: Transaction Systems to Make Big Brother Obsolete
-
Chaum D (1985) Security without Identification: Transaction Systems to Make Big Brother Obsolete. CACM 28 (10): 1030-1044
-
(1985)
CACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
11
-
-
0035480037
-
Identity Management and Its Support of Multilateral Security
-
Clauß S, Köhntopp M (2001) Identity Management and Its Support of Multilateral Security. Computer Networks, 37 (2): 205-219
-
(2001)
Computer Networks
, vol.37
, Issue.2
, pp. 205-219
-
-
Clauß, S.1
Köhntopp, M.2
-
13
-
-
33845544061
-
Privacy-Enhancing Identity Management
-
67: 8-16, Accessed 2 Dec
-
Clauß S, Pfitzmann A, Hansen M, Van Herreweghen E (2002) Privacy-Enhancing Identity Management. The IPTS Report 67: 8-16. http://www.jrc.es/home/report/english/articles/vol67/IPT2E676.htm. Accessed 2 Dec 2007
-
(2002)
The IPTS Report
-
-
Clauß, S.1
Pfitzmann, A.2
Hansen, M.3
Van Herreweghen, E.4
-
14
-
-
33748577578
-
-
Accessed 2 Dec 2007
-
Eurobarometer (2003) Data Protection. http://ec.europa.eu/ public_opinion/archives/ebs/_ebs_196_data_protection.pdf. Accessed 2 Dec 2007
-
(2003)
Data Protection
-
-
Eurobarometer1
-
15
-
-
84878887098
-
HCI Designs for Privacy-Enhancing Identity Management
-
Acquisti A, Gritzalis S, Lambrinoudakis C, Di Vimercati S eds, Auerbach, in press
-
Fischer-Hübner S, Pettersson JS, Bergmann M, Hansen M, Pearson S, Casassa Mont M (2007) HCI Designs for Privacy-Enhancing Identity Management. In: Acquisti A, Gritzalis S, Lambrinoudakis C, Di Vimercati S (eds) Digital Privacy: Theory, Technologies, and Practices, Auerbach, in press
-
(2007)
Digital Privacy: Theory, Technologies, and Practices
-
-
Fischer-Hübner, S.1
Pettersson, J.S.2
Bergmann, M.3
Hansen, M.4
Pearson, S.5
Casassa Mont, M.6
-
16
-
-
45949108110
-
Verkettung digitaler Identitäten
-
Hansen M, Meissner S eds, Accessed 2 Dec 2007
-
Hansen M, Meissner S (eds) (2007) Verkettung digitaler Identitäten. Report commissioned by the German Federal Ministry of Education and Research. https://www. datenschutzzentrum.de/projekte/verkettung/. Accessed 2 Dec 2007
-
(2007)
Report commissioned by the German Federal Ministry of Education and Research
-
-
-
17
-
-
45949086868
-
-
Hildebrandt M, Koops B-J (eds) (2007) A Vision of Ambient Law. FIDIS Deliverable D7.9. Frankfurt am Main, Germany. http://www.fidis.net/ fileadmin/fidis/deliverables/fidis-wp7-d7.9_A_Vision_of_Ambient_Law.pdf. Accessed 2 Dec 2007
-
Hildebrandt M, Koops B-J (eds) (2007) A Vision of Ambient Law. FIDIS Deliverable D7.9. Frankfurt am Main, Germany. http://www.fidis.net/ fileadmin/fidis/deliverables/fidis-wp7-d7.9_A_Vision_of_Ambient_Law.pdf. Accessed 2 Dec 2007
-
-
-
-
18
-
-
45949100511
-
-
Hildebrandt M, Meints M (eds) (2006) RFID, Profiling, and AmI. FIDIS Deliverable D7.7. Frankfurt am Main, Germany. http://www.fidis.net/ fileadmin/fidis/deliverables/fidis-wp7-del7.7.RFID_profiling_AMI.pdf. Accessed 2 Dec 2007
-
Hildebrandt M, Meints M (eds) (2006) RFID, Profiling, and AmI. FIDIS Deliverable D7.7. Frankfurt am Main, Germany. http://www.fidis.net/ fileadmin/fidis/deliverables/fidis-wp7-del7.7.RFID_profiling_AMI.pdf. Accessed 2 Dec 2007
-
-
-
-
21
-
-
33750083950
-
User Centric Identity Management
-
Australia, Accessed 2 Dec 2007
-
Jøsang A, Pope S (2005) User Centric Identity Management. In: Proceedings of AusCERT, Australia. http://sky.fit.qut.edu.au/~josang/ papers/JP2005-AusCERT.pdf. Accessed 2 Dec 2007
-
(2005)
Proceedings of AusCERT
-
-
Jøsang, A.1
Pope, S.2
-
22
-
-
84957805078
-
Platform for Enterprise Privacy Practices: Privacy-enabled Management of Customer Data
-
Proceedings of 2nd Workshop on Privacy Enhancing Technologies PET, Springer
-
Karjoth G, Schunter M, Waidner M (2002) Platform for Enterprise Privacy Practices: Privacy-enabled Management of Customer Data. In: Proceedings of 2nd Workshop on Privacy Enhancing Technologies (PET 2002), LNCS 2482, Springer, 69-84
-
(2002)
LNCS
, vol.2482
, pp. 69-84
-
-
Karjoth, G.1
Schunter, M.2
Waidner, M.3
-
23
-
-
45949099336
-
-
Leenes R, Schallaböck J, Hansen M eds, Accessed 2 Dec 2007
-
Leenes R, Schallaböck J, Hansen M (eds) (2007) Privacy and Identity Management for Europe - PRIME White Paper V2. https://www.prime-project.eu/prime_products/whitepaper/. Accessed 2 Dec 2007
-
(2007)
Privacy and Identity Management for Europe - PRIME White Paper V2
-
-
-
24
-
-
45949110534
-
-
Mehldau M (2007) Iconset for Data-Privacy Declarations v0.1. http://netzpolitik.org/wpupload/data-privacy-icons-v01.pdf. Accessed 2 Dec 2007
-
Mehldau M (2007) Iconset for Data-Privacy Declarations v0.1. http://netzpolitik.org/wpupload/data-privacy-icons-v01.pdf. Accessed 2 Dec 2007
-
-
-
-
25
-
-
45949107368
-
Protokollierung bei Identitätsmanagementsystemen - Anforderungen und Lösungsansätze.
-
Meints M (2006) Protokollierung bei Identitätsmanagementsystemen - Anforderungen und Lösungsansätze. Datenschutz und Datensicherheit 30 (5): 304-307
-
(2006)
Datenschutz und Datensicherheit
, vol.30
, Issue.5
, pp. 304-307
-
-
Meints, M.1
-
27
-
-
84889001691
-
Outlining "Data Track": Privacy-Friendly Data Maintenance for End-Users
-
Springer US
-
Pettersson JS, Fischer-Hübner S, Bergmann M (2006) Outlining "Data Track": Privacy-Friendly Data Maintenance for End-Users. In: Advances in Information Systems Development - New Methods and Practice for the Networked Society, Proceedings of the 15th International Conference on Information Systems Development (ISD 2006), Springer US, 215-226
-
(2006)
Advances in Information Systems Development - New Methods and Practice for the Networked Society, Proceedings of the 15th International Conference on Information Systems Development (ISD
, pp. 215-226
-
-
Pettersson, J.S.1
Fischer-Hübner, S.2
Bergmann, M.3
-
28
-
-
45949083647
-
-
Pfitzmann A, Hansen M (2007) Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology v0.30. http://dud.inf.tu-dresden.de/ Anon_Terminology.shtml. Accessed 2 Dec 2007
-
Pfitzmann A, Hansen M (2007) Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology v0.30. http://dud.inf.tu-dresden.de/ Anon_Terminology.shtml. Accessed 2 Dec 2007
-
-
-
-
29
-
-
45949093586
-
Accessed 2
-
Dec
-
PRIME Tutorials (2007). https://www.prime-project.eu/tutorials/. Accessed 2 Dec 2007
-
(2007)
-
-
-
30
-
-
84926682846
-
-
Presentation at Internet Governance Forum 2006, October 2006, Athens, Accessed 2 Dec 2007
-
Rundle M (2006) International Data Protection and Digital Identity Management Tools. Presentation at Internet Governance Forum 2006, October 2006, Athens. http://identityproject.lse.ac.uk/mary.pdf. Accessed 2 Dec 2007
-
(2006)
International Data Protection and Digital Identity Management Tools
-
-
Rundle, M.1
|