Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D3.1: Overview on IMS
References
[Ber00]Workshop on Freedom and Privacy by Design / Conference on Freedom and Privacy 2000, pp. 57-65, Toronto/Canada, April 2000.
[Buc99]FlexiPKI - Realisierung einer flexiblen Public-Key-Infrastruktur. Technischer Bericht der TU Darmstadt, December 1999.
[Cam01]Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In Advances in Cryptology – EUROCRYPT 2001, vol. 2045 of LNCS, pp. 93-118. Springer Verlag, 2001.
[Cam02]Proceedings of 9th ACM Conference on Computer and Communications Security. ACM Press, 2002.
[Cha81]Communications of the ACM, 24(2): pp. 84-88, Feb. 1981.
[Cha88]Advances in Cryptology — CRYPTO ‘88, vol. 403 of LNCS, pp. 319-327. Springer Verlag, 1990.
[Cla93]Proceedings of the Computers, Freedom & Privacy Conference, San Francisco, 1993.
[Cla01]Computer Networks, 37(2): pp. 205-219, October 2001.
[Cra02] L. Cranor, M. Langheinrich, M. Massimo, M. Presler-Marshall, and J. Reagle. The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. http://www.w3.org/TR/P3P, April 2002.
[Dwo96]Proceedings of 28th Annual ACM Symposium on Theory of Computing (STOC), 1996.
[Fia86]Advances in Cryptology — CRYPTO ‘86, vol. 263 of LNCS, pp. 186-194. Springer Verlag, 1987.
[Ger01]Sicherheitskonzepte für das Internet, Kapitel 7, pp. 135-146. Springer-Verlag Berlin, Mai 2001.
[Ger03a]PIK Sonderheft Sicherheit 2003, 26(1): pp. 5-14, 2003
[Ger03b]Benutzbare Sicherheit für informationstechnische Systeme, Dissertation at Albert-Ludwigs-Universität Freiburg, 2003.
[Gol98] Advances in Cryptology ‑ CRYPTO ‘98, vol. 1642 of LNCS, pp. 153-168. Springer Verlag, 1998.
[ICP03] ICPP (2003). Independent Centre for Privacy Protection (ICPP) Schleswig-Holstein and Studio Notarile Genghini (SNG); Identity Management Systems (IMS): Identification and Comparison; study prepared under contract for Institute for Prospective Technological Studies, Joint Research Centre Seville, Spain, Sept. 2003;
http://www.datenschutzzentrum.de/idmanage/study/ICPP_SNG_IMS-Study.pdf
[Jen00] Proceedings of the 16th Annual Computer Security Applications Conference, pp. 344-353, December 2000.
[Jen01]Verlässliche IT-Systeme ‑ Sicherheit in komplexen Infrastrukturen, pp. 77-85. Vieweg, Wiesbaden, September 2001.
[Lys99] Proceedings of Selected Areas in Cryptography, vol. 1758 of LNCS. Springer Verlag, 1999.
[Pfi00] Secure and Anonymous Electronic Commerce: Providing Legal Certainty in Open Digital Systems Without Compromising Anonymity. Technical Report RZ 3232 (93278) 05/22/00, IBM Research Division, Zürich, Mai 2000.
[Ran97]Mehrseitige Sicherheit in der Kommunikationstechnik, pp. 21-29. Addison-Wesley Longman Verlag GmbH, 1997.
[Sch96]Grundlagen und Probleme der Betriebswirtschaft, pp. 492-494, Wirtschaftsverlage Bachem, 1996
[Sed01]Proceedings of the International Workshop “Innovative Internet Computing Systems”, Ilmenau, Juni 2001.
[Stu99] Unlinkable serial transactions: Protocols and applications. In ACM Transactions on Information and System Security, 2(4): pp. 354-389, Nov. 1999.
[Sun05] Sun Java™ System Access Manager 6. Technical Overview 2005Q1. Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054, U.S.A., Part No: 817-7643-10.
[Wol00]Computer Networks, 32: pp.685-699, 2000.
28 / 31 |