You are here: Resources > FIDIS Deliverables > HighTechID > D3.6: Study on ID Documents > 

D3.6: Study on ID Documents

Summary, Conclusions and Outlook  Title:
REFERENCES
 Glossary and Abbreviations

 

References

 

27th International Conference of Data Protection and Privacy Commissioners, Resolution on the use of biometrics in passports, identity cards and travel documents, Montreux 16 September 2005. http://www.edps.eu.int/legislation/05-09-16_resolution_biometrics_EN.pdf.

‘2b or not 2b - Evaluatierapport Biometrieproef 2b or not 2b’, Ministrie van Binnenlandse Zaken en Koninkrijksrelaties (BZK), Amsterdam 2005. http://www.minbzk.nl/contents/pages/43760/evaluatierapport1.pdf.

Alterman, A., ‘A Piece of yourself: Ethical issues in biometric identification’, Ethics and Information Technology 5, 2003, pp. 139-150.

Arndt, C., ‘The loss of privacy and identity’, Biometric Technology Today, 2005.

Article 29 Data Protection Working Party, Opinion No 7/2004 on the inclusion of biometric elements in residence permits and visas taking account of the establishment of the European information system on visas (VIS), adopted on 11 August 2004 (Markt/11487/04/EN-WP 96). http://europa.eu.int/comm/justice_home/fsj/privacy/workinggroup/index_en.htm.

Article 29 Data Protection Working Party, Opinion on the Proposal for a Regulation of the European Parliament and of the Council concerning the Visa Information System (VIS) and the exchange of data between Member States on short stay-visas (COM (2004) 835 final, adopted on 23 June 2005. http://europa.eu.int/comm/justice_home/fsj/privacy/workinggroup/index_en.htm.

Article 29 Data Protection Working Party, Opinion on Implementing the Council Regulation (EC) No 2252/2004 of 13 December 2004 on standards for security features and biometrics in passports and travel documents issued by Member States (WP 112), Official Journal L 385, 29 December 2004. http://europa.eu.int/comm/justice_home/fsj/privacy/workinggroup/index_en.htm.

Article 29 Data Protection Working Party, Working Document on Biometrics, adopted on 1 August 2003 (Markt/10595/03/EN-WP80).

Article 29 Data Protection Working Party, ‘Working Document on Data Protection Issues Related to RFID Technology. 10107/05/EN WP 105’, January 2005. http://europa.eu.int/comm/internal_market/privacy/docs/wpdocs/2005/wp105_en.pdf.

Avoine G., Oechslin P., ‘RFID Traceability: A multilayer problem’, Financial Cryptography - FC’05, Lecture Notes in Computer Science, Springer, Heidelberg, 2005.

Backhouse, J. (Ed.), FIDIS Deliverable 4.1 – Structured account of approaches on interoperability, Frankfurt a. M. 2005. See http://www.fidis.net/fidis_del.0.html

AXSionics.AG, ‘About Us’. http://www.axsionics.ch/. Accessed on 10.08.2005. 

Backhouse, J., ‘Information @ Risk’, Information Strategy, December/January 2000, pp. 33-35.

Backhouse, J., Hsu, C., McDonnell, A., ‘Technical Opinion: Toward Public-Key Infrastructure Interoperability’, Communications of the ACM, 46 (6), 2003, pp. 98-100.

Beel, J., Gipp, B., ePass – der neue biometrische Reispass, Shaker Verlag, Aachen 2005. Chapter 6 “Fazit” can be downloaded via http://www.beel.org/epass/epass-kapitel6-fazit.pdf.

Bennett, C. J., ‘Evidence of Policy Convergence’ in Regulating Privacy: Data Protection and Public Policy in Europe and the United States, Ithaca, Cornell University Press, New York, 1992, pp. 95-115, Chapter 3.

Bennett, C. J., Raab, C. D., ‘The Adequacy of Privacy: The European Union Data Protection Directive and the North American Response’, The Information Society, 13 (3), 1997, pp. 245-264.

Bertalanffy, L., General System Theory, George Braziller Inc., New York, 1969.

‘Biometric Deployment of Machine Readable Travel Documents – ICAO TAG MRTD/NTWG’, Version 2.0, ICAO, Montreal 2004. http://www.icao.int/mrtd/download/documents/Biometrics%20deployment%20of%20Machine%20Readable%20Travel%20Documents%202004.pdf. 

Bjergstrom, N., ‘Basic Man-Machine Introductions’, Speech on InfoSeCon, Dubrovnik, 8 June, 2005.

Borchers, D., ‘Kritik am ePass’, c’t (21) 2005, p. 60, Heise Zeitschriften Verlag, Hannover 2005.

Brito, J., ‘Relax, do not do it: Why RFID privacy concerns are exaggerated and legislation is premature’, UCLA Journal of Law and Technology, 8 (2), Fall 2004. http://www.lawtechjournal.com/articles/2004/05_041220_brito.pdf.

Brooks, L., ‘Structuration Theory and New Technology: Analysing Organizationally Situated Computer-Aided Design (Cad)’, Information Systems Journal, 7 (2), 1997, p. 133.

CAP Gemini Ernst Young, ‘Online Availability of Public Services: How Does Europe Progress?’, Brussels, 2003. 

Cavoukian, A., ‘Tag, you’re it: Privacy implications of radio frequency identification (RFID) technology’, February 2004. http://www.ipc.on.ca/scripts/index_.asp?action=31&P_ID=15007 

CEN/ISSS (2004), ‘Towards an electronic ID for the European Citizen, a strategic vision’, CEN/ISSS Workshop eAuthentication, Brussels, 03.10.2004, pp. 1-71. http://europa.eu.int/idabc/servlets/Doc?id=19132.

Chen, W., Hirschheim, R., ‘A Paradigmatic and Methodological Examination of Information Systems Research from 1991 to 2001’, Info Systems, 14, 2004, pp. 197-235.

Chua, W. F., ‘Radical Developments of Accounting Thought’, Accounting Review, 61, 1986, pp. 601-632.

CIA, ‘The World Factbook 2002’. http://www.faqs.org/docs/factbook/. Accessed on 15.03.2005. 

Cowcher, R., ‘Current Issues on Interoperability 09.03.05’. (Personal communication.)

De Hert, P., Gutwirth, S., ‘Making sense of privacy and data protection: A prospective overview in the light of the future of identity, location-based services and virtual residence’ in IPTS, Security and Privacy for the Citizen in the Post-September 11 Digital Age: A Prospective Overview. Report to the European Parliament Committee on Citizens’ Freedoms and Rights, Justice and Home Affairs (LIBE), July 2003, IPTS-Technical Report Series, EUR 20823 EN, pp. 111-162.

De Hert, P., Gutwirth, S., ‘Privacy, data protection and law enforcement. Opacity of the individual and transparency of the power’, in Claes, E., Duff, A., Gutwirth, S. (Eds.), Privacy and the criminal law, Antwerp/Oxford, Intersentia, 2005, pp. 61-104.

Der Standard, ‘Bei E-Card Drohen Millionen an Mehrkosten’. http://derstandard.at/. Accessed on 05.08.2005.

Dhillon, G., Backhouse, J., ‘Current Directions in Is Security Research: Towards Socio-Organisational Perspectives’, Information Systems Journal, 11 (2), 2001, pp. 127-153.

Engberg, S.J., ‘FIDIS WP 5 Workshop Open Business Innovation’, Tilburg, 2005.

Enterprise DG, ‘Networking of Public Administrations - the Ida Mission’. http://europa.eu.int/idabc/en/document/78/25. Accessed on 07.03.2004. 

Etzioni, A. (Ed.), The Limits of Privacy, Basic Books, New York, 1999, pp. 183-215.

European Commission, ‘The Role of eGovernment for Europe’s Future’, 2003. 

European Commission, ‘e-Europe 2005 Midterm Review’, 2004a. 

European Commission, ‘Linking up Europe: The Importance of Interoperability for eGovernment Services’, 2004b. 

European Commission, ‘Vol. June 2005 (IDABC) European Commission’, 2005, p. 25. 

European Data Protection Supervisor, ‘Opinion of 20 January 2006 on the Proposal for a Council Decision concerning access for consultation of the Visa Information System (VIS) by the authorities of Member States responsible for internal security and by Europol for the purposes of the prevention, detection and investigation of terrorist offences and of other serious criminal offences (COM (2005) 600 final)’. http://www.edps.eu.int/.

European Parliament, ‘Vol. Article 8 European Parliament’, 2000. 

European Parliament, ‘Fact Sheets 1999-2002’, 2002. http://www.europarl.eu.int/factsheets/default_en.htm. Accessed on 22.08.2005 

Eurostat, ‘European Demography in 2003’. http://epp.eurostat.cec.eu.int/cache/ITY_PUBLIC/3-31082004-BP/EN/3-31082004-BP-EN.PDF. 

Fishkin, K.P., Roy, S., Jiang, B., ‘Some methods for privacy in RFID communication’, European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), Lecture Notes in Computer Science 3313, Springer, Heidelberg, 2004, pages 42-53.

Floerkemeier, C., Schneider, R., Langheinrich, M., ‘Scanning with a purpose - supporting the fair information principles in RFID protocols.’ Paper presented at 2nd International Symposium on Ubiquitous Computing Systems (UCS 2004), November 2004. http://www.vs.inf.ethz.ch/publ/papers/floerkem2004-rfidprivacy.

Forastieri, V., ‘Evidence against a Relationship between Dermatoglyphic Asymmetry and Male Sexual Orientation’, Human Biology No. 74/6, Wayne State University Press, Detroit, 2002, pp. 861-870.

Foucault, M., Discipline and punish: the birth of the prison. Harmondsworth: Penguin, 1977.

Freh, S., ‘Analysis of Global eID Projects with Focus on Interoperability by Using the TFI Model’, 2005a. 

Freh, S., ‘Talent & Income Statements: The New “Freihändler” of Europe’, 2005b. 

Friedrich, E., Seidel, U., ‘The introduction of the German e-passport. Biometric passport offers first-class balance between security and privacy’, Keesing Journal of Documents & Identity, Issue 16, 2006, pp. 3-6.

Fusaro, R. A., ‘None of our business?’, Harvard Business Review, 82 (12): December 2004, pp. 33-38.

Garfinkel, S., Rosenberg, B. (Eds.), RFID - Applications, Security, and Privacy, Addison-Wesley, New York 2005.

Garfinkel, S., ‘An RFID bill of rights’, MIT Technology Review, Oct. 2002, p. 35.

Gasson, M., Meints, M., Warwick, K. (Eds.), FIDIS Deliverable 3.2 - Study on PKI and Biometrics, Frankfurt a. M. 2005. See http://www.fidis.net/487.0.html

Gaubatz, G., Kaps, J.-P., Sunar, B., ‘Public key cryptography in sensor networks - revisited’, in Castelluccia, C. et al. (Eds.), European Workshop on Security in Ad-hoc and Sensor Networks (ESAS 2004), Lecture Notes in Computer Science 3313, Springer, Heidelberg, 2004, pp. 2-18.

Geradts, Z., Sommer, P., FIDIS Deliverable 6.1 - Forensic Implications of Identity Management Systems, Frankfurt a.M., 2005. http://www.fidis.net/fileadmin/fidis/deliverables/fidis-wp6-del6.1.forensic_implications_of_identity_management_systems.pdf.

GUIDE, ‘Creating a European Identity Management Architecture for eGovernment’. http://istrg.som.surrey.ac.uk/projects/guide/. Accessed on 20.03.05. 

GUIDE, ‘Deliverable D1.2.1.B Identity Interoperability Service Report: Core Service Descriptions’, Version 2.0, Brussels 2005. http://istrg.som.surrey.ac.uk/projects/guide/files/documents/D1.2.1.B.pdf. 

Hall, J.A.Y., Kimura D., ‘Dermatoglyphic Asymmetry and Sexual Orientation in Men’, Behavioral Neuroscience, No. 108, APA Press, Washington, 1994, pp. 1203-1206. http://www.sfu.ca/~dkimura/articles/derm.htm.

Hansen, M., et al., ‘Identity Management Systems (IMS): Identification and Comparison Study’, Independent Centre for Privacy Protection Schleswig-Holstein and Studio Notarile Genghini, 2003. http://www.datenschutzzentrum.de/idmanage/study/ICPP_SNG_IMS-Study.pdf.

Hayat, A., et al., ‘Survey on EU’s Electronic-ID Solutions’, Vienna, 2004. 

Hes, R., et al., At face value. On biometrical identification and privacy, Registratiekamer, The Hague, September 1999. http://www.dutchdpa.nl/downloads_av/AV15.pdf.

Hildebrandt, M., Backhouse, J. (Eds.), FIDIS Deliverable D7.2 - Descriptive analysis and inventory of profiling practices, Frankfurt a.M., 2005. See http://www.fidis.net/.

Hildebrandt, M., Gutwirth, S. (Eds.), FIDIS Deliverable D7.4 - Implications of profiling on democracy and the rule of law, Frankfurt a.M., 2005. See http://www.fidis.net/.

Hoepman, J.-H., Jacobs, B., ‘E-passports without the big picture’, Egovmonitor, 20 February 2006, available through http://www.egovmonitor.com/node/4716.

Hollosi, A., ‘Requirements for Interoperability in IMS at the Example of Austria’s Bürgerkarte’. (Personal communication.) 2005.

Hollosi, A., Karlinger, G., ‘Die Österreichische Bürgerkarte: Einführung’, 2005.

Home Affairs Committee, Vol. Fourth Report (Committee, H. A.), 2004.  

Jain, A., Hong, L., Pankanti, S., ‘Biometric Identification’, Communications of the ACM No. 43/2, New York, 2000, pp. 91-98.

ICA 35th Conference Report, ‘Round Table Report: Austria’. http://egov.alentejodigital.pt/Austria/ICA_austria.pdf. Accessed in October 2001. 

Information Society and Media DG ,‘eGovernment Interoperability and Pan-European Services’, 2005a. http://europa.eu.int/information_society/activities/egovernment_research/focus/interoperability/index_en.htm#projects. 

Information Society and Media DG, ‘Search for Individual Research Projects Funded under FP5 and FP6 by the IST Programme’, 2005c. http://www.cordis.lu/ist/projects/projects.htm. 

International Organization for Standardization / International Electrotechnical Commission: Numerous standards mentioned in the chapters and .

Jacobs, B., ‘Biometrische gegevens horen niet in een databank’ (translated: Biometrical data do not belong in a database)’- Volkskrant Forum, 28 February 2006. http://www.cs.ru.nl/B.Jacobs/PRESS/volkskrant-28-2-06.txt.

Juels, A., ‘Minimalist cryptography for low-cost RFID tags (extended abstract)’, in Blundo, C., Cimato, S. (Eds.), Fourth International Conference on Security in Communication Networks - SCN 2004, Lecture Notes in Computer Science 3352, Springer, Heidelberg, 2004, pp. 149-164.

Juels, A., ‘Strengthening EPC tags against cloning.’ Manuscript, October 2004.

Juels, A., Pappu, R., ‘Squealing Euros: Privacy protection in RFID-enabled banknotes’, in Wright, R. (Ed.), Financial Cryptography, Lecture Notes in Computer Science 2742, Springer, Heidelberg, 2003, pp. 103-121.

Juels, A., Rivest, R.L., Szydlo, M., ‘The blocker tag: selective blocking of RFID tags for consumer privacy’, in 10th ACM Conference on Computer and Communication Security, ACM Press, New York, 2003, pp. 103-111.

Kinder, T., ‘Mrs Miller Moves House: The Interoperability of Local Public Services in Europe’, Journal of European Social Policy, 13 (2), 2003, pp. 141-157.

Klischewski, R., ‘Top Down or Bottom Up? - How to Establish a Common Ground for Semantic Interoperability within E-Government Communities’, 2000.  

Kocher, P.C., Timing Attacks on Implementations of Diffie-Hellmann, RSA, DSS, and Other Systems, Internet 1995.

Kocher, P.C., Jaffe, J., Jun, B., Introduction to Differential Power Analysis and Related Attacks, 1998. http://www.cryptography.com/resources/whitepapers/DPATechInfo.pdf.

Krissler, J, Kurz, C., Die Ergebnisse der BioP2-Studie zur Leistungsfähigkeit biometrischer Systeme’, FIfF Kommunikation (4) 2005, FIfF, Bremen 2005.

Leitold, H., ‘Requirements for Interoperability in Ims at the Example of Austria’s Bürgerkarte’, 2005.  

London School of Economics and Political Science, ‘The Identity Project: An Assessment of the UK Identity Card Bill & Its Implications’ The Department of Information Systems London., 2005.

Luckett, D., ‘The supply chain’, BT Technology Journal, 22 (3), London, July 2004, pp. 50-55.

Luhmann, N., Social Systems, Stanford University Press, Stanford, 1995.

Lyon, D., ‘The Electronic Eye: The Rise of Surveillance Society’, Polity Press, pp. 22-39, Chapter 2, 1994.

McGinity, M., ‘RFID: Is this game of tag fair play?’, Commun. ACM, 47 (1), New York, 2004, pp. 15-18.

Markus, L., Robey, D., ‘Information Technology and Organizational Change: Causal Structure in Theory and Research’, Management Science, 34 (5), 1988, pp. 583-599.

Martin, B., in eGovernment Workshop Vienna, 2004.

Martin, B., in FIDIS workshop D3.5 IKT-Stabstelle, Frankfurt, 2005.

Mayer-Schönberger, V., ‘Generational Development of Data Protection in Europe’ in Regulating Privacy: Data Protection and Public Policy in Europe and the United States, Ithaca, Cornell University Press, New York, 1992, pp. 219-241, Chapter 8.

Mead, G. H., Mind, Self and Society, Chicago Press, 1934.

Meints, M., Hansen, M., Bauer, M. (Eds.), FIDIS Deliverable D3.1 - Overview on Identity Management Systems, Frankfurt a.M., 2005. See http://www.fidis.net/fidis_del.0.html

Miller, B., ‘Towards a Framework for Managing the Information Environment’, Information, Knowledge, Systems Management, 2, 2001, pp. 359-384.

Mingers, J., ‘Combining Is Research Methods: Towards, a Pluralist Methodology’, Information Systems Research, 12 (3), 2001, pp. 240-259.

Molnar, D., Wagner, D., ‘Privacy and Security in Library RFID: Issues, Practices, and Architectures’, in 11th ACM Conference on Computer and Communications Security (CCS), ACM Press, New York, 2004, pp. 210-219.

Müller, L., Discussion of the Possibilities of Pets Nowadays and in the near Future 21.06.2005. (Personal communication.)

Nabeth, T., Hildebrandt, M. (Eds.), FIDIS Deliverable D2.1: Inventory of topics and clusters, Frankfurt a.M., 2005. See http://fidis.net/fileadmin/fidis/deliverables/fidis-wp2-del2.1_Inventory_of_topics_and_clusters.pdf.

NETC@RDS, ‘Project Information’. http://www.netcards-project.com/projectinfo.php. Accessed on 03.08.2005. 

News aktuell GmbH, ‘ZDF-Reporter zeigt, wie EU-Bürger Arbeitslosengeld II kassieren können’. http://shortnews.stern.de/shownews.cfm?id=584278. Accessed on 22.08.2005.

O.E.C.D. Working Party on Information Security and Privacy, Background material on biometrics and enhanced network systems for the security of international travel, 23 December 2004, 53 p. http://www.oecd.org/dataoecd/16/18/34661198.pdf.

ORF.at, ‘Die unendliche Geschichte der E-Card’. http://www.orf.at/050805-89910/89915txt_story.html. Accessed on 05.08.2005.

Orlikowski, W.J., Baroudi, J.J., ‘Studying Information Technology in Organizations: Research Approaches and Assumptions’, Information Systems Research, 2 (1), 1991, pp. 1-28.

Orwell, G., Nineteen Eighty Four, Harmondsworth: Penguin, New York, 1949.

Otter, H., Requirements for Interoperability in IMS at the Example of Austria’s eCard 30.06.2005. (Personal communication.)

Otter, H., Managing Identity, German Embassy Info Center, 2005b.

Ouksel, A., ‘A Framework for a Scalable Agent Architecture for Cooperating Heterogeneous Knowledge Sources’ in Klusch, M. (Ed.), Intelligent Information Age: Cooperative, Rational and Adaptive Information Gathering in the Internet, Springer, Chapter 5, 1999.

Ouksel, A.M., Sheth, A., ‘Semantic Interoperability in Global Information Systems’, SIGMOD Record, 28 (1), 1999, pp. 5-12.

Payette, S., et al,, ‘Interoperability for Digital Objects and Repositories’, D-Lib Magazine, 5 (5), 1999, pp. 41-68.

Peers, S., ‘The Legality of the Regulation on EU Citizens’ Passports’, 26 November 2004, pp. 1-4. http://www.statewatch.org/news/2004/nov/legal-analy-bio-passports.pdf.

Pfitzmann, A., Hansen, M. (Eds.), Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology, v0.27, 20 February 2006. http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.27.pdf. 

Posch, R., Holzbach, M., ‘The Austrian Citizen Card - Citizen Card Concept.’ http://www.buergerkarte.at/en/was_ist_die_buergerkarte/konzept_buergerkarte.html. Accessed on 05.07.2005. 

Posner, R.A., ‘John A. Sibley Lecture: The Right of Privacy’, Georgia Law Review, 12 (3), 1978.

Prins, J.E.J., ‘Making our body identify for us: legal implications of biometric technologies’, Computer, Law & Security Report, 1998, Vol. 14, No. 3, pp. 159-165.

Privacy International, About Privacy International, 2005. http://www.privacyinternational.org/article.shtml?cmd[347]=x-347-65428. Accessed on 18.07.2005.

Rankl, W., Effing, W., Smart Card Handbook, John Wiley & Sons, New York, 2003.

Realini, A., ‘G2G E-Government: The Big Challenge for Europe’, Master’s Thesis. Version: 1.1, 2004. http://www.ifi.unizh.ch/egov/Diplomarbeit_Realini.pdf. 

Riedl, R., Affordance in E-Government. In Electronic Government: Second International Conference, Proceedings / eGov 2003, Springer, Prague, Czech Republic, 2003.

Ringwald, A., ‘Electronic Identity: eEurope Smart Cards / Trailblazer 1 “Public Identity”’ eEurope Paris, 2003.

Schnittger, B., ‘Introducing IDABC: European Integration by Electronic Means’, SYNeRGY, (01), 2005, pp. 3-6.

Schreurs, W., Hildebrandt, M., Gasson, M., Warwick, K. (Eds.), FIDIS Deliverable D7.3 - Report on Actual and Possible Profiling Techniques in the Field of Ambient Intelligence, Frankfurt a.M., 2005. See http://www.fidis.net/.

Sozialversicherungs-Chipkarten Betriebs- und Errichtungsgesellschaft m.b.H., ‘Leistungen’. http://www.chipkarte.at/esvapps/page/page.jsp?p_pageid=220&p_menuid=51921&p_id=5. Accessed on 16.07.2005.

Sun Microsystems, Java Card Platform Specification v2.2.2, 2006. Download: http://java.sun.com/products/javacard/index.jsp.

Stalder, F., Lyon, D., Electronic Identity Cards and Social Stratification, Routledge, New York, 2002.

Stamper, R., et al., ‘Understanding the Roles of Signs and Norms in Organizations: a Semiotic Approach to Information Systems Design’, Behaviour & Information Technology, 19, 2000, pp. 15-27.

Singer, R., ‘Nun Terrorized by Terror Watch’,Wired 2005. http://www.wired.com/news/privacy/0,1848,68973,00.html?tw=wn_tophead_1, 2005.  

Swann, P., Temple, P., Schurmer, M., ‘Standards and Trade Performance: The UK Experience’, The Economic Journal, 106 (438), 1996, pp. 1297-1313.

Teodori, M., L’Europa Non Ê L’America, Arnoldo Mondadori Editore, Milano, 2004.

University of Ottawa, Legal Systems, University of Ottawa, http://www.droitcivil.uottawa.ca/world-legal-systems/eng-presentation.html. Accessed on 01.08.2005.

Untersuchung der Leistungsfähigkeit von biometrischen Verifikationssystemen – BioP II’, German Federal Office for Information Security (BSI), Bonn 2005. http://www.bsi.de/literat/studien/biop/biop_2.htm.

Vanfleteren, M., Kindt, E., Use of Credentials Systems in E-Commerce, Katholieke Universiteit Leuven, London, 2005.

Van Kralingen, R., Prinis, C., Grijpink, J., Het lichaam als sleutel. Juridische beschouwingen over biometrie [translated: The body as key. Legal observations on biometrics], ITER 1997.

Want, R., ‘RFID: A key to automating everything’, Scientific American, No. 290(1), New York, 2004, pp. 46-55.

Warren, S., Brandeis, L., ‘The Right to Privacy’, Harvard Law Review, (193), 1890.

Wayman, J., ‘Linking Persons to Documents with Biometrics. Biometric systems from the 1970s to date’, Keesing Journal of Documents & Identity, Issue 16, 2006, pp. 14-19.

Weis, S., Sarma, S., Rivest, R., Engels, D., ‘Security and privacy aspects of low-cost radio frequency identification systems’, First International Conference on Security in Pervasive Computing, Lecture Notes in Computer Science 2802, Springer, Heidelberg, 2003, pp. 201-212.

Weiss, A., ‘Me and my shadow’, ACM netWorker, 7(3), New York, 2003, pp. 24-30.

Westin, A.F., ‘The Function of Privacy in Society’, in Privacy and Freedom New York, 1967, pp. 8-21, Chapter 1.

 

Summary, Conclusions and Outlook  fidis-wp3-del3.6.study_on_id_documents_03.sxw  Glossary and Abbreviations
Denis Royer 53 / 56