You are here: Resources > FIDIS Deliverables > HighTechID > D3.10: Biometrics in identity management > 

D3.10: Biometrics in identity management

Conclusions  Title:
BIBLIOGRAPHY
 Annex 1: Acronyms and Glossary

 

Bibliography

 

Andronikou, V., Demetis, D., Varvarigou, Th., ‘Biometric Implementations and the Implications for Security and Privacy’, 1st in-house FIDIS journal issue, 1-2007, available at http://journal.fidis.net/fileadmin/journal/issues/1-2007/Biometric_Implementations_and_the_ Implications _for_Security_and_Privacy.pdf

Ang R., R. Safavi-Naini, L. McAven, ‘Cancelable Key-Based Fingerprint Templates’, ACISP 2005, pp. 242-252, 2005. 

Archmann, S. and M. Meyerhoff Nielsen, ‘Interoperability at Local and Regional Level- a logical development in eGovernment’, EIPASCOPE 2006/1, pp 39-44.

Article 29 Data Protection Working Party, Working document on biometrics, 1 August 2003, 11 p.

Article 29 Data Protection Working Party, Opinion on Implementing the Council Regulation (EC) N° 2252/2004 of 13 December 2004 on standards for security features and biometrics in passports and travel documents issued by Member States, 30 September 2005, 12 p.

Article 29 Data Protection Working Party, Opinion 4/2007 on the concept of personal data, 20 June 2007, 26 p.

Ashbourn, J., ‘The Social Implications of the Wide Scale Implementation of Biometric and Related Technologies’, Background paper for the Institute of Prospective Technological Studies, DG JRC – Sevilla, European Commission January 2005.

Avoine, G., Kalach, K., and Quisquater, J.-J., Belgian Biometric Passport does not get a pass… Your personal data are in danger, June 2007.

Backhouse, J., `Interoperablity of Identity and Identity Management Systems´ in: Datenschutz und Sicherheit, 2006, vol 30, 9, pp 568-570.

Balzacq, T et al, Security and the Two-Level Game: The Treaty of Prüm, the EU and the management of threats”, CEPS Working Document No 234/ January 2006.

Balzacq, T and S. Carrera (eds.), Security v Freedom: A Challenge for Europe’s Future, 2006, Brussels, CEPS

Bauer, M., Meints, M., (eds.), D 3.1 Structured Overview on Prototypes and Concepts of Identity Management Systems, FIDIS, 2004, 77 p.

Bekkers, V et al. (eds), Information and Communication Technology and Public Innovation; assessing the ICT-driven modernization of public administration, IOS Press, Amsterdam 2006, pp 219-229.

Bekkers, V., H. van Duivenboden and M. Thaens, ‘Public Innovation and Information and Communication Technology: relevant backgrounds and concepts’ in Bekkers, 2006, pp 3-21. 

Benecke, M., ‘Coding or non-coding, that is the question’, EMBO reports vol. 3 no. 6, June 2002, available at http://www.benecke.com/coding.pdf

Boult, T. E., Scheirer, W. J., Woodworth, R., ‘Revocable Fingerprint Biotokens: Accuracy and Security Analysis’, Computer Vision and Pattern Recognition, 2007. CVPR ‘07. IEEE Conference on 17-22 June 2007.

Brömme, A., A Discussion on Privacy Needs and (Mis)Use of Biometric IT-Systems.

Brown, D., Brook, D., ‘Biometrics: Implications and Applications for Citizenship and Immigration - Report on a Forum hosted by Citizenship and Immigration Canada’, October 7 & 8, 2003 – Ottawa, Ontario. 

Cavoukian, A., Consumer Biometric Applications : A discussion paper, Toronto, Information and Privacy Commissioner, Ontario, September 1999, 62 p.

Cavoukian, A., Privacy and Biometrics, Toronto, Ontario, Information and Privacy Commissioner, Ontario, September 99, 15 p.

Cavoukian, A. and Stoianov, A., Biometric Encryption : A Positive-Sum Technology that Achieves Strong Authentication, Security AND Privacy, in, Information and Privacy Commissioner, Ontario, March 2007, 48 p.

Cheung K. H., Ad. Wai-Kin Kong, D. Zhang, M. Kamel, Jane You, Ho-Wang Lam, ‘An Analysis on Accuracy of Cancelable Biometrics Based on BioHashing’, Lecture Notes in Computer Science, Springer, 2005, pp. 1168-1172.

Clarke, R., ‘Biometrics’ Inadequacies and Threats, and the Need for Regulation’, Presentation on the Computers, Freedom & Privacy 2002, available at http://www.anu.edu.au/people/ Roger.Clarke/DV/BiomThreats.html

Cole, S. A., Fingerprint Identification and the Criminal Justice System: Historical Lessons for the DNA Debate, University of California, Irvine. Download via http://www.ksg.harvard.edu/dnabook/

Commission of the European Communities, Communication to the Council and the European Parliament on improved effectiveness, enhanced operability and synergies among European Databases in the area of Justice and Home Affairs, COM (2005)597 final, Brussels, 25 November 2005.

Commission of the European Communities, Communication to the Council and the European Parliament on Interoperability for Pan-European e-Government Services, COM (2006) 45, 13 February 2006

Commission of the European Communities, Proposal for a Council Framework Decision on the Exchange of Information under the Principle of Availability, COM(2005) 490 final,12 October 2005

Commission of the European Communities Implementing the Hague Programme: the Way Forward, COM (2006) 331 final Communication, 28 June 2006

Commission of the European Communities, Communication from the Commission to the Council and the European Parliament. Evaluation of EU Policies on Freedom, Security and Justice, COM(2006) 332 final, 28 June 2006

Commission of the European Communities, Report on the implementation of the Hague Programme for 2005. COM(2006) 333 final Communication from the Commission to the Council and the European Parliament, 28 June 2006.

Committee of experts on data protection (CJ-PD), The introduction and use of personal identification numbers: the data protection issues, Study prepared by the under the authority of the European Committee on Legal Co-operation (CDCJ), Strasbourg 1991, chapter II, available at http://www.coe.int/T/E/Legal_affairs/Legal_co-cperation/Data_protection/ Documents/Publications/4Pins.asp#TopOfPage

Commissie voor de Bescherming van de Persoonlijke Levenssfeer, Verslag over de werkzaamheden 2005, 2005, 159 p.

Council Of Europe, Progress report on the application of the principles of convention 108 to the collection and processing of biometric data, Strasbourg, February 2005, 26 p.

Dessimoz, D. and Richiardi, J., Multimodal Biometrics for Identity Documents, Research Report PFS 341-08.05 v1.0 (September 2005), http://www.biometrics catalog.org/documents/MBioIDStateOfTheArt_v1.0-8.pdf

De Hert, P., W Schreurs and E. Brouwer, ‘Machine-readable identity documents with biometric data in the EU: Overview of the legal framework’, Keesing Journal of Documents and Identity, Issue 21, 2006, pp 3-10.

De Hert, P. and A. Sprokkereef, An Assessment of the Proposed Uniform Format for Residence Permits: Use of Biometrics, CEPS Briefing Note for the European Parliament’s committee on Civil Liberties, Justice and Home Affairs, IP/C/LIBE/FWC/2005-xx, can be retrieved from www.ceps.be.

De Hert, P., What are the Risks and What Guarantees Need to be Put in Place in View of Interoperability of Police Databases? 01.02.2006 IP/C/LIBE/FWC/2005-25, Briefing paper for the EP Citizens Rights and Constitutional Affairs Committee, available through http://www.ipolnet.ep.parl.union.eu/ipolnet/cms, (section 4).

De Hert, P., V. Papakonstantinou and C. Riehle, Data Protection in the Third Pillar. Cautious Pessimism.

De Leeuw, E., ‘Biometrie en nationaal identiteitsmanagement’, Privacy en Informatie 2007, afl. 2, 50-56.

European Data protection Supervisor (EDPS), ‘Common Consular Instructions-EDPS opinion’, EDPS Newsletter, no. 7, 14 December 2006, 2 (www.edps.europa.eu.)

European Biometrics Forum (forthcoming), Security & Privacy in large Scale Biometric Systems, A report commissioned by JRC/ITPS

European Commission, Joint Research Centre (DG JRC), Institute for Prospective Technological Studies (IPTS)’, Biometrics at the Frontiers: Assessing the Impact on Society, Brussels 2005, available at http://www.biteproject.org/ documents/EU_ Biometrics _at_the_Frontiers.pdf

Gasson, M., Meints, M. et al., (eds.), D.3.2.: A study on PKI and biometrics, FIDIS, 4 July 2005, 138 p.

Geradts, Z., Sommer, P. (eds.), D6.1. ‘Forensic Implications of Identity Management Systems’, FIDIS, 2005, available at www.fidis.net

Gijrath, S., ‘Interoperability Revisited: How far stretches the duty to negotiate interconnection?’, Computer and Telecommunications Law Review, 2006/1

Grijpink, J. H. A. M., ‘Een beoordelingsmodel voor de inzet van biometrie’, Privacy & Informatie 2006, afl. 1, 14-17.

Hildebrandt, M., Backhouse, J. (eds.), D.7.2. Descriptive analysis and inventory of profiling practices, FIDIS, 2005, available at http://www.fidis.net/fileadmin/fidis/ deliverables/fidis-wp7-del7.2.profiling_practices.pdf

 

Jacobs, B., ‘Select before you Collect’, Ars Aequi, vol. 54, December 2005, 1006-1009

Jay, R. and Hamilton, A., Data Protection. Law and Practice, London, Sweet & Maxwell, 2003

Juels, A., Molnar, D. and Wagner, D., ‘Security and Privacy Issues in E-Passports’, Proc. 1st Intl. Conf. on Security and Privacy for Emerging Areas in Communications Networks, IEEE Computer Society, Los Alamitos, CA, vol. 2005, 74-85.

Kindt, E., ‘Biometric applications and the data protection legislation’, Datenschutz und Datensicherheit 2007, vol. 3, 166-170.

Linnartz, J.P. and Tuyls, P., New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates, AVBPA 2003, LNCS 

Lips, M. Taylor and Organ, ‘Identity Management as a Public Innovation: looking beyond ID cards’, in Bekker et al. (2006), pp 204-216

Lodge,J., ‘EJustice, Security and Biometrics: the EU’s Proximity Paradox’, European Journal of Crime, Criminal Law and Criminal Justice, 2005, Vol 13 no 4., pp 533-564

LSE, The Identity project: an assessment of the UK identity project and its implications. London, 2005.

Ludford, S. (rapporteur), EP working document on the proposal for a regulation of the European Parliament and of the Council amending Common Consular Instructions on visas for diplomatic missions and consular posts in relation to the introduction of biometrics including provisions on the organisation of the reception and processing of visa application COM(2006 (88), PE 386.565v01-00

Meints, M. and Hansen, M. (eds.), D3.6. Study on ID Documents, FIDIS, 2006, 160 p.

Meints, M., ’Implementierung grosser biometrischer Systeme. Kriterien und deren Anwendung am Beispiel des ePasses’, Datenschutz und Datensicherheit 2007, afl. 31, 189-193.

Müller, G., Rannenberg, K., Multilateral Security in Communications, Vol. 3 Technology, Infrastructure, Economy, Addison Wesley, München 1999.

National Consultative Ethics Committee For Health And Life Sciences, Opinion N° 98 . Biometrics, identifying data and human rights, 26 April 2007, 22 p. 

Oliver, G. M., study of the use of biometrics as it relates to personal privacy concerns, July 31, 1999, available at: http://faculty.ed.umuc.edu/~meinkej/inss690/oliver/Oliver-690.htm

Organisation For Economic Co-Operation And Development, Biometric-based Technologies, 28 April 2004, 66 p.

Pfitzmann, A. and Hansen, M., Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology v.0.30, 26 November 2007, available at  http://dud.inf.tu-dresden.de/Anon_Terminology.shtml

Ploeg, I. Van der, ’The Illegal Body: ‘Eurodac’ and the Politics of Biometric Identification, Ethics and Information Technology, 1999, 1, pp 295-302

Prabhakar, S., Pankanti, S. and Jain, A.K., "Biometric recognition: security and privacy concerns," Security & Privacy Magazine, IEEE , vol.1, no.2 pp. 33- 42, Mar-Apr 2003.

Prins, C., ‘Making Our Bodies Work for Us: Legal implications of Biometric Technologies’, Computer Law & Security Report, 14. no 3., 1998, pp 159-165

Ratha N. K., J. H. Connell, and R. M. Bolle, ‘Enhancing security and privacy in biometrics-based authentication systems’, IBM Systems Journal, 40(3), 2001

Rejman-Greene, M. (Ed.), Roadmap for Biometrics in Europe to 2010, BioVision, 15 October 2003, 202 p.

Rigoutsos, I., Huynh, T., Miranda, K., Tsirigos, A., McHardy, A. , Platt, D., ‘Short blocks from the noncoding parts of the human genome have instances within nearly all known genes and relate to biological processes’, Proceedings of the National Academy of Science of the United States vol. 103 no. 17, pp. 6605-6610, Washington D. C., April 2006.

Rodotà, S., Working document on biometrics, IPA Herfstdagen on Security, August 1, 2003, available at  http://www.win.tue.nl/ipa/archive/falldays2005/Paper_1_ Leenes.pdf

Rotenberg, B., The Legal regulation of Software Interoperabilty in the EU: confronting Microsoft with Appleby and Chasagnou, Jean Monnet Working Paper 07/05, 2005, New York, NYU School of Law

Soutar, C., Roberge, D., Stoianov, Al., Gilroy, R., Kumar, B.V.K. V., ‘Biometric Encryption’, chapter 22 in ICSA Guide to Cryptography, edited by Randall K. Nichols, McGraw-Hill, 1999.

Thomas, R., ‘Biometrics, international Migrants and Human Rights’, European Journal of Migration and Law, 2005, vol 7, pp 377-411

Toh, K.-A., Lee, Ch., Choi J.-Y., and Kim J., Performance based revocable biometrics, Industrial Electronics and Applications, 2007, ICIEA 2007, 2nd IEEE Conference on
23-25 May 2007.

Van Blarkom, G.W., Borking, J.J., Olk, J.G.E., Handbook of Privacy and Privacy-Enhancing Technologies – The case of Intelligent Software Agents, College bescherming persoonsgegevens, 2003, 33 p.

Van Kralingen, R., Prins, C., and Grijpink, J., "Het lichaam als sleutel", National Programma Informatietechnologie en Recht, 8, Alphen aan den Rijn/Diegem, Samsom BedrijfsInformatie Bv, 1997, 2-66.

Von Graevenitz, G., Erfolgskriterien und Absatzchancen biometrischer Identifikationsverfahren, LIT Verlage, Berlin 2006.

Von Hardenberg, I., ‘Warum Neugeborene mehr wissen, als Große manchmal ahnen’, GEO (7), pp.27-42, Hamburg, July 2001.

Wallwork, A. and J. Baptista, ‘Understanding Operability’ in J. Backhouse (ed.), Structured Accounts of Approaches on Interoperability, Ch 4, Report D4.1 Future of Identity in the Information Society (FIDIS), 6th Framework Programme, European Commission, 2005, pp 19-24, see p 20, available through: http//www.fidis.net/487.0.htm#820

Weichert, T., ’Staatliche Identifizierung durch Biometrie’, Datenschutz Nachrichten 2004, afl. 2, 9-19.

Yanikoglu B. and Al. Kholmatov,Combining Multiple Biometrics to Protect Privacy’, Proceedings of ICPR-BCTP Workshop, Cambridge, England, Aug. 2004.

Yau Wei Yun and Chen Tai Pang Lawrence, An introduction to biometric match-on-card, Synthesis 2005 Section Three (2005), http://www.itsc.org.sg/synthesis /2005/3_BiometricMOC.pdf.

Yevgeniy Dodis, Leonid Reyzin, and Adam Smith. Fuzzy extractors: How to generate string keys from biometrics and other noisy data. In Proceedings of the International Conference on Advances in Cryptology (EUROCRYPT ‘04), Lecture Notes in Computer Science. Springer Verlag, 2004. 

 

Conclusions  20071228_fidis_deliverable_wp3_10_V1.0.final.sxw  Annex 1: Acronyms and Glossary
38 / 40