Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- D5.1: A survey on legislation on ID theft in the EU and….
- D5.2: ID Fraud Workshop.
- D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research.
- D5.2c: Identity related crime in the world of films.
- D5.3: A Multidisciplinary Article on Identity-related Crime.
- D5.4: Anonymity in electronic government: a case-study analysis of governments? identity knowledge.
- D6.1: Forensic Implications of Identity Management Systems.
- D6.5/D6.6: Second thematic Workshop forensic implications.
- D6.7b: Workshop on Forensic Profiling.
- D6.7c: Forensic Profiling.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
Bibliography
[Bauer 2000] Friedrich L. Bauer, Decrypted Secrets, Springer, 2000.
[Baumann et al. 2005] Rainer Baumann, Marcel Rieser, Reto Strobl, FrancoisWeissbaum, AndreaWeisskopf, Privacy Preserving Data Collection, Swiss Federal Section For Cryptography, 2005.
[BFS 1997] Der Datenschutz in der Medizinischen Statistik / La protection des données dans la statistique médicale, BFS Bundesamt für Statistik / Office fédéral de la statistique (CH), 1997.
[Hildebrandt & Gutwirth 2007] Mireille Hildebrandt and Serge Gutwirth (eds), Identity in a Networked World, Springer, to be published 2007.
[ISO 15408-2] ISO 15408-2. Text for ISO/IEC 1th WD 15408-2, Information technology – Security techniques – Evaluation criteria for IT security – Part 2: Security functional requirements. 2003 (http://www.commoncriteria.de).
[Jaquet-Chiffelle 2003] David-Olivier Jaquet-Chiffelle (ed.). Impact of new technologies on privacy and data protection. TILT 15, special issue, Berne University of Applied Sciences, School of Engineering and Information Technology, 2003 (download from http://www.vip.ch).
[Jaquet-Chiffelle & Jeanneret 2001] David-Olivier Jaquet-Chiffelle and Jean-Paul Jeanneret. How to protect the rights of patients to medical secrecy in official statistics. Information Security Bulletin, The International Journal for IT Security Professionals, vol. 6, nb. 8, pp. 41-43, 2001.
[Roeder et al. 2004] Christoph Roeder, Amer EL-Kerdi, S. Eggli, and Max Aebi. A centralized total joint replacement registry using web-based technologies. J Bone Joint Surg Am, vol.86-A, nb. 9, pp. 2077-2080,2004.
[Stallings 1998] William Stallings, Cryptography and Network Security: Principles and Practice, Prentice Hall, 1998.
[Ström 2005] Pär Ström. Die Überwachungsmafia, Das gute Geschäft mit unseren Daten. Carl Hanser Verlag, 2005.
Part III. Conclusion
41 / 45 |