Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
Bibliography
Warren, S.D., Brandeis, L.D., The Right to Privacy, Harvard Law Review, No. 5, 1890-91, pp.193-220.
Westin, A.F., Privacy and Freedom, Atheneum, New York, 1967.
Hogben, G., Annex A, PRIME project deliverable D14.0a, (Framework V0), June 2004.
Lieshout, M. van, Grossi, L., Spinelli, G., Helmus, S., Kool, L., Pennings, L., Stap, R., Veugen, T., Waaij, B. van der, Borean, C.. RFID Technologies: Emerging Issues, Challenges and Policy Options. Sevilla: IPTS, EN22770. 2006, http://www.jrc.es/publications/pub.cfm?id=1476
National Institute of Standards, Guidelines for Securing Radio Frequency Identification (RFID) Systems Special Publication 800-98, April 2007.
CASPIAN (Consumers Against Supermarket Privacy Invasion and Numbering), http://www.nocards.org/index.shtml
EPIC (Electronic Privacy Information Center), RFID privacy page, http://www.epic.org/privacy/rfid/
Bundesamt für Sicherheit in der Informationstechnik, Risiken und Chancen des Einsates von RFID-Systemen – Trends und Entwicklungen in technologies, Anwendungen und Sicherheit, SecuMedia, 2004.
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, hereinafter the “Data Protection Directive”, Official Journal, L 281/31 – L 281/39.
Dammann, U., Simitis, Sp., EG-Datenschutzrichtlinie, Nomos Verlagsgesellschaft, 1997, p. 109
Kuner, C., European Data Privacy Law and Online Business, Oxford University Press, 2003, p.51
Art. 29 Data Protection Working Party, Working document on data protection issues related to RFID technology, WP105, 19 January 2005, Available at: http://www.eu.int/comm/justice_home/fsj/privacy/docs/wpdocs/2005/wp105_en.pdf
Art. 29 - Data Protection Working Party, Working document on biometrics, WP 80, 1 August 2003, available at: http://ec.europa.eu/justice_home/fsj/privacy/ docs/wpdocs/2003/wp80_en.pdf
Privacyrechtelijke aspecten van RFID, report prepared by the ECP.NL. Platform voor eNederland for the Dutch Ministry of Economic Affairs and in cooperation with the RFID Platform Nederland and GSI Nederland, May 2005, (p. 24), available online at http://www.rfidconsultation.eu/docs/ficheiros/Privacyrechtelijke_aspecten_van_RFID.pdf
Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector, O.J. L201,37, 31 July 2002
Theodora Toutziaraki, Ein winzig kleiner Chip, ein riesengroße Herausforderung für den Datenschutz, DuD 31 (2007), S. 107-112 (109).
Legal IST, D.15: Legal issues of RFID technology, 13.03.2006, available online at http://193.72.209.176/projects/P1507/D15%20Report%20on%20Additional%20Legal%20Issues%20-%20final%20version.pdf
Art. 29 Data Protection Working Party, Working Document on the processing of personal data relating to health in electronic health records (EHR), WP131, 15 February 2007, Available at: http://ec.europa.eu/justice_home/fsj/privacy/docs/wpdocs/2007/wp131_en.pdf
Universal Declaration of Human Rights, United Nations General Assembly resolution 217 A (III), 1948, Art. 12, http://www.unhchr.ch/udhr/lang/eng.htm (12/28/06).
Hildebrandt M. and Gutwirth S. (eds.), Profiling the European Citizen – Cross-disciplinary perspectives, Deliverable D7.5 of FIDIS, to be published 2007, Springer.
Ateniese G., Camenisch J., de Medeiros B., Untraceable RFID tags via insubvertible encryption, in: Proceedings of the 12th ACM Conference on Computer and Communications Security CCS ‘05, ACM Press, p. 92-101, 2005
Wood D. M. (ed.), A Report on the Surveillance Society – For the Information Commissioner by the Surveillance Studies Network, http://www.privacyconference2006.co.uk/index.asp?PageID=10 (12/27/06).
EPTA European Parliamentary Technology Assessment network , ICT and Privacy in Europe – Experiences from technology assessment of ICT and Privacy in seven different European countries, 2006, http://epub.oeaw.ac.at/ita/ita-projektberichte/e2-2a44.pdf (12/27/06).
Bizer J., Spiekermann S., Günther O. (eds.), TAUCIS Technikfolgenabschätzung Ubiquitäres Computing und Informationelle Selbstbestimmung, Studie im Auftrag des Bundesministeriums für Bildung und Forschung, 2006, http://www.taucis.hu-berlin.de/_download/TAUCIS_Studie.pdf (12/28/06).
Bird S. J. and Spier R. (eds), Report on the Budapest Meeting 2005 – Intensified Networking on Ethics of Science, Science and Engineering Ethics, vol 12(4), p. 731-793, 2006.
Berleur J. and Brunnstein K. (eds), Ethics of Computing – Codes, spaces for discussion and law, Chapman & Hall, London UK, 1996.
Berleur J. and d’Udekem-Gevers M., Codes of Ethics Within IFIP and Other Computer Societies, in: Ethics of Computing – Codes, spaces for discussion and law, Berleur J. and Brunnstein K. (eds), Chapman & Hall, London UK, 1996
Association for Computing Machinery ACM, ACM Code of Ethics and Professional Conduct, (Adopted by ACM Council 10/16/92), http://www.acm.org/constitution/code.html (12/27/06).
The British Computer Society, British Computer Society Code of Conduct, 2001, http://www.bcs.org/upload/pdf/conduct.pdf (12/27/06).
Lee J. A. N. and Berleur J. Progress towards a World-Wide Code of Conduct. In: Ethics in the Computer Age – Proceedings of the conference on Ethics in the computer age, ACM press, p. 100-104, 1994, http://portal.acm.org/ft_gateway.cfm?id=199594&type=pdf (12/28/06).
Fawcett E., The Toronto Resolution, Accountability in Research, vol 3, p 69-72, 1994.
acatech - Konvent für Technikwissenschaften der Union der deutschen Akademien der Wissenschaften e.V.: RFID wird erwachsen. Deutschland sollte die Potenziale der elektronischen Identifikation nutzen, acatech BEZIEHT POSITION, issue 1, 2006, Fraunhofer IRB Verlag
Capgemini: RFID and Consumers: What European Consumers Think About Radio Frequency Identification and the Implications for Business. 2005. URL: http://www.us.capgemini.com/DownloadLibrary/requestfile.asp?ID=450, published 9th February 2005.
News release: World’s smallest and thinnest 0.15 x 0.15 mm, 7.5µm thick RFID IC chip. Hitachi, Ltd., http://www.hitachi.com/New/cnews/060206.html, February 6, 2006.
Spiekermann, S., Rothensee, M., Soziale und psychologische Bestimmungsfaktoren des Ubiquitous Computing, Humboldt-Universität, Berlin, July 2005. Available at: http://interval.huberlin.de/downloads/rfid/neuste%20forschungsergebnisse/SocioPsychofak.pdf
Juels A., Rivest R. L., and Szydlo M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In V. Atluri, ed. 8th ACM Conference on Computer and Communications Security, pp. 103-111. ACM Press. 2003
Garfinkle S. and Rosenberg B. (eds) , RFID: Applications, Security and Privacy, Pearson Education Inc, July, 2005, ISBN-0-321-29096-8.
Punie Y., Delaitre S., Maghiros I. & Wright D. (eds), Dark scenarios in ambient intelligence: Highlighting risks and vulnerabilities, Safeguards in a World of Ambient Intelligence (SWAMI) Deliverable D2, January, 2006.
Juels A. RFID Security and Privacy: A Research Survey, RSA Laboratories, September, 2005
ICAO_NTWG, PKI Task Force, PKI for Machine Readable Travel Documents offering ICC Read-Only Access, Technical Report, Version 1.1, October, 2004.
Newitz A. The RFID Hacking Underground , WIRED, http://www.wired.com/wired/archive/14.05/rfid_pr.html, accessed 2007-04-24
Reid S., ‘Safest ever’ passport is not fit for purpose, Daily Mail, http://www.dailymail.co.uk/pages/live/articles/news/news.html?in_article_id=440069&in_page_id=1770 accessed 2007-04-24
Juels A. Minimalist cryptography for low-cost RFID tags. In Blundo C. and Cimato S., (eds), The Fourth International Conference on Security in Communication Networks – SCN 2004 , volume 3352 of Lecture Notes in Computer Science, pages 149–164. Springer-Verlag, 2004.
Rieback M. Crispo B. Tanenbaum A., Is your cat infected with a Computer Virus?, Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM’06) - Volume 00, pp169 – 179, 2006
Sarma S. E., Towards the five-cent tag, Technical Report MIT-AUTOID-WH-006, MIT Auto ID Center, 2001. Available from http://www.autoidcenter.org
Hennig, J; Ladkin, P; Sieker, B: Privacy Enhancing Technology Concepts for RFID Technology Scrutinised, 2004, RVS Group, University of Bielefeld, Bielefeld, Germany, RVS-RR-04-02, available through http://www.rvs.uni-bielefeld.de → Publications → Research Reports.
PRIME project leaflet, May 2005, https://www.prime-project.eu/press_room/leaflets/PRIME-flyer-20040518.pdf
Garfinkel S. An RFID Bill of Rights. Technology Review, page 35,October 2002.
Sieker B, Ladkin P. B, Hennig J. E. RVS Group, University of Bielefeld in cooperation with FoeBuD e.V. and Causalis Limited: Privacy Checklist for Privacy Enhancing Technology Concepts for RFID Technology Revisited, 13 October 2005
Ohkubo M., Suzuki K., and Kinoshita S. Cryptographic approach to a privacy friendly tag. In RFID Privacy Workshop, MIT, 2003.
Molnar D., Soppera A., and Wagner D. Privacy for RFID through trusted computing (short paper). In De Capitani di Vimercati S. and Dingledine R., (eds), Workshop on Privacy in the Electronic Society (WPES), 2005.
Sarma S. E., Weis S. A., and Engels D. W.. RFID systems, security and privacy implications. Technical Report MIT-AUTOID-WH-014, AutoID Center, MIT, 2002.
Weis S., Sarma S., Rivest R., and Engels D.. Security and privacy aspects of low-cost radio frequency identification systems. In Hutter D., Müller G., Stephan W., and Ullmann M., (eds), International Conference on Security in Pervasive Computing – SPC 2003, volume 2802 of Lecture Notes in Computer Science, pages 454–469. Springer-Verlag, 2003.
Ateniese G., Camenisch J., and de Madeiros B. Untraceable RFID tags via insubvertible encryption. In 12th ACM Conference on Computer and Communication Security, 2005
Juels A. ‘Yoking-proofs’ for RFID tags. In Sandhu R. and Thomas R., (eds), Workshop on Pervasive Computing and Communications Security – PerSec 2004, pages 138–143. IEEE Computer Society, 2004.
Avoine G. and Oechslin Ph. RFID traceability: A multilayer problem. In Financial Cryptography — FC’05, LNCS, Springer, 2005
Juels A. and Brainard J. Soft blocking: Flexible blocker tags on the cheap. In De Capitani di Vimercati S. and Syverson P., (eds), Workshop on Privacy in the Electronic Society – WPES, pages 1–7. ACM, ACM Press, 2004.
Müller G., Rannenberg K. (eds.): Multilateral Security in Communications; Addison-Wesley-Longman; München et al. 1999; ISBN-3-8273-1360-0
Sotto L. J., An RFID Code of Conduct, RFID journal http://www.rfidjournal.com/article/view/1624/ (7.5.07), 2005.
UK RFID Council, A UK code of practice for the use of radio frequency identification (RFID) in retail outlets, release 1.0, 2006
Heise Online News, Data protectionists call for RFID code of conduct http://www.heise.de/english/newsticker/news/75263 (7.5.07), 2006
Heise Online News, Neue Vorstöße zur RFID-Selbstregulierung der Industrie http://www.heise.de/newsticker/meldung/73621 (7.5.07), 2006
European Expert Group for IT-Security (EICAR), Task force on RFID “Leitfaden: RFID und Datenschutz”, http://www.eicar.org/rfid/infomaterial/RFID-Leitfaden-100406.pdf (7.5.07)
Münzberg H, Aufklärung der Konsumenten wird der Knackpunkt für RFID, Capgemini http://www.de.capgemini.com/presse/pressemitteilungen/archiv_2005/rfid/ (7.507), 2005
Bungard D. et al. Orientierungshilfe «Datenschutzgerechter Einsatz von RFID», Arbeitskreis “Technische und organisatorische Datenschutzfragen” der Konferenz der Datenschutzbeauftragten des Bundes und der Länder, 2006.
Rodotà S., Capurro R., Ethical Aspects of ICT Implants in the Human Body, Opinion of the European Group on Ethics in Science and New Technologies to the European Commission, 2005
Pitkänen O. and Niemelä M, Privacy and data protection in Emerging RFID-Applications, paper presented at the EU RFID Forum 2007, RFID Academic Convocation, 14 March 2007, available online at http://www.rfidconvocation.eu/Papers%20presented/Business/Privacy%20and%20Data%20Protection%20in%20Emerging%20RFID-Applications.pdf
Kardasiadou Z. and Talidou Z, Legal issues of RFID technology, Legal-IST, IST-2-004252-SSA, D15, 2006
Müller J, Ist das Auslesen von RFID-Tags zulässig?, DuD (28) 2004,p. 215
Bygrave L, Data Protection Law – Approaching its Rationale, Logic and Limits, Kluwer International, 2002
Dutch Ministry of Justice, Personal Data Protection Act: Guidelines for Personal Data Processors (2001)
Commission of the European Communities, Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the committee of the regions – Radio Frequency Identification (RFID) in Europe: steps towards a policy framework, COM(2007)96 final.
EU Press Release, Commission proposes a European policy strategy for smart radio tags, IP/07/332, Brussels/Hannover, 15 March 2007
PRIME Project, Deliverable D14.0.a, Framework V0, Chapter 5.0 ‘The Legal and Regulatory Framework for PRIME’ (Anna Buchta, Jos Dumortier, Henry Krasemann)
Carey P, E-Privacy and Online Data Protection, Butterworths, 2002
Schmidt A. IT and the judiciary in the Netherlands - A state of affairs. Computer Law & Security Reports 23 (3): 1-8, 2007
Agre, P. E. and M. Rotenberg, (eds).. Technology and Privacy: The New Landscape. Cambridge, Massachusetts, MIT, 2001
Barth, A., A. Datta, et al. Privacy and Contextual Integrity: Framework and Applications. Sp, 2006
Bygrave L. Minding the Machine. Art.15 and the EC Data Protection Directive and automated profiling. Computer Law & Security Report. 17: 17-24
Custers, B. The Power of Knowledge. Ethical, Legal, and Technological Aspects of Data Mining and Group Profiling in Epidemiology. Nijmegen, Wolf Legal Publishers
Dötzer, F. Privacy Issues in Vehicular Ad Hoc Networks. Workshop on Privacy Enhancing Technologies. Dubrovnik, available at: http://www13.informatik.tu-muenchen.de/personen/doetzer/publications/Doetzer-05-PrivacyIssuesVANETs.pdf
Fayyad, U. M., G. Piatetsky-Shapiro, et al., (eds). Advances in Knowledge Discovery and Data Mining. Meno Park, California - Cambridge, Mass. - London England, AAAI Press / MIT Press
Flanagan, M., D. Howe, et al. Values in Design: Theory and Practice. Information Technology and Moral Philosophy. Van den Hoven J.and Weckert J. Cambridge, Cambridge University Press
Jiang, X. Safeguard Privacy in Ubiquitous Computing with Decentralized Information Spaces: Bridging the Technical and the Social. Privacy Workshop September 29, 2002, University of California, Berkeley. Berkeley, available at: http://guir.berkeley.edu/pubs/ubicomp2002/privacyworkshop/papers/jiang-privacyworkshop.pdf
Nissenbaum, H. Privacy as Contextual Integrity. Washington Law Review 79: 101-140
Rip, A., T. Misa, J., et al. Managing Technology in Society: The Approach of Constructive Technology Assessment, Pinter Publishers
Roussos, G., D. Peterson, et al. Mobile Identity Management: An Enacted View. International Journal of Electronic Commerce 8 (1): 81-100
Art. 29 Data Protection Working Party, Opinion 4/2007 on the concept of personal data, WP 136, 20 June 2007, available at http://ec.europa.eu/justice_home/fsj/privacy/docs/wpdocs/2007/wp136_en.pdf
Hsi, S., Fait, H., RFID enhances visitors’ museum experience at the Exploratorium, Communications of the ACM, Vol. 48, No. 9, Assn. For Computing Machinery, New York, September 2005, pp 60 -65.
Fleck, M. et al., From Informing to Remembering: Ubiquitous Systems in Interactive Museums, IEEE Pervasive Computing, Vol.1, No. 2, IEEE Computer Society, April 2002, pp. 13-21.
38 / 38 |