You are here: Resources > FIDIS Deliverables > Identity of Identity > D2.13: Virtual Persons and Identities > 

D2.13: Virtual Persons and Identities

Conclusion  D2.13 Virtual Persons
REFERENCES
 

 

References

Anrig, Bernhard, Browne, Will, & Gasson, Mark. 2007. The role of algorithms in profiling. In: Hildebrandt, Mireille, & Gutwirth, Serge (eds), Profiling the European Citizen. Springer.

Benoist, Emmanuel. 2007. Collecting data for the profiling of web-users. In: Hildebrandt, Mireille, & Gutwirth, Serge (eds), Profiling the European Citizen. Springer.

Bourcier, D. (2001). "De l’intelligence artificielle à la personne virtuelle: émergence d’une entité juridique?" Droit et Société 49: 847-871

Bowder, Caspar, Bramhall, Pete, Cameron, Kim, Casassa-Mont, Marco, Colville, David, Goodman, David, Hilton, Jeremy, Marthhoefer, Michael, & White, Michael. 2004. Toward Understanding Identity. Washington, D.C.: eema report, National Academies Press.

Cameron, Kim. 2005. The Laws of Identity. http://www.identityblog.com/?page_id=354 (may 1st 2005).

Dempster, Art. 1967. Upper and Lower Probabilities Induced by a Multivalued Mapping. Ann. Math. Stat., 38, 325–339.

Haenni, Rolf, Kohlas, Jürg, & Lehmann, Norbert. 2000. Probabilistic Argumentation Systems. Pages 221–287 of: Kohlas, Jürg, & Moral, Serafin (eds), Handbook of Defeasible Reasoning and Uncertainty Management Systems, vol. 5: Algorithms for Uncertainty and Defeasible Reasoning. Kluwer, Dordrecht.

Hildebrandt, M. and S. Gutwirth, Eds. (2008). Profiling the European Citizen. Cross-disciplinary Perspectives. Dordrecht, Springer

Hildebrandt, M. and B.-J. Koops (2007). A Vision of Ambient Law. Brussels, FIDIS

Hogenhout, Wide. 2006. Report on the workshop “Distributed security and dynamic trust” (DISTTRUST). http://cordis.europa.eu/ist/fet/gc.htm (june 21st 2006), Global Computing (GC) follow-up, Proactive Initiative in the 6th Framework Programme of the European Union.

ISO 15408-2. 2003. Text for ISO/IEC 1th WD 15408-2, Information technology - Security techniques – Evaluation criteria for IT security – Part 2: Security functional requirements. http://www.commoncriteria.de (sept. 1st 2006).

ISO/IEC 4th Working Draft 24760 - Information technology - Security techniques - A framework for identity management

ITU-T Y.2091 – Terms and definitions for Next Generation Networks – http://www.itu.int/rec/T-REC-Y.2091/en (Jan. 29th, 2008)

ITU-T Y.IdMsec – NGN Identity Management Security –- document in draft

Jaquet-Chiffelle, David-Olivier. 2007. Reply to chapter “Defining profiling: a new type of knowledge?”. In: Hildebrandt, Mireille, & Gutwirth, Serge (eds), Profiling the European Citizen. Springer.

Jaquet-Chiffelle, David-Olivier, Benoist, Emmanuel, & Anrig, Bernhard (eds). 2006. D2.6 Identity in a Networked World, Deliverable of FIDIS’ Workpackage 2. FIDIS http://www.fidis.net (sept. 10th 2006).

Jonczy, Jacek, & Haenni, Rolf. 2006. Implementing Credential Networks. Pages 788–799 of: iTrust’06, 4th International Conference on Trust Management, Pisa, Italy.

Jøsang, Audun. 1999. An Algebra for Assessing Trust in Certification Chains. In: Kochmar, J. (ed), Proc. of the Network and Distributed Systems Security (NDSS’99) Symposium. The Internet Society.

Kantorowicz, E. H. (1957). The King’s Two Bodies. A Study in Mediaeval Political Theology. Princeton, NJ, Princeton University Press

Kent, Stephen T., & Millett, Lynette I. (eds). 2004. Who Goes There? Washington, D.C.: National Academies Press.

Kohlas, Jürg, Anrig, Bernhard, Haenni, Rolf, & Monney, Paul-André. 1998. Model-Based Diagnostics and Probabilistic Assumption-Based Reasoning. Artificial Intelligence, 104, 71– 106.

Kohlas, Reto, Haenni, Rolf, & Jonczy, Jacek. 2006a. Formalizing Evidence for Authentication, Trust Management and Identification. Draft version available at http://www.iam.unibe.ch/~run/publications.php?link=publi st 2006).

Kohlas, Reto, Jonczy, Jacek, & Haenni, Rolf. 2006b. Towards Precise Semantics for Authenticity and Trust. In: PST’06, 4th Annual Conference on Privacy, Security and Trust, Toronto, Canada.

Modinis Common Terminological Framework for Interoperable Electronic Identity Managementhttps://www.cosic.esat.kuleuven.be/modinisidm/twiki/bin/view.cgi/Main/GlossaryDoc?code=nldsv13294 (Jan. 29th, 2008)

Nabeth, Thierry (ed). 2005. D2.2 Set of use cases and scenarios, Second Deliverable of FIDIS’ Workpackage 2. FIDIS http://www.fidis.net (feb. 3rd 2005).

Nabeth, Thierry, & Hildebrandt, Mireille (eds). 2005. D2.1 Inventory of topics and clusters, First Deliverable of FIDIS’ Workpackage 2. FIDIS http://www.fidis.net (feb. 3rd 2005).

Pfitzman, Andreas, & Hansen, Marit. 2007. Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology, TU Dresden, http://dud.inf.tu-dresden.de/Anon_Terminology.shtml, v0.30 (January 29th 2008).

Roy, Bernard. 1991. The Outranking Approach and the Foundations of ELECTRE Methods. Theory and Decision, 31(1), 49–73.

Schneider, Bruce. 2005. Two-Factor Authentication: Too Little, Too Late. Communications of the ACM, 48(4), 136.

Shafer, Glenn. 1976. The Mathematical Theory of Evidence. Princeton University Press.

Smets, Philippe. 1998. The Transferable Belief Model for Quantified Belief Representation. Pages 267–301 of: Gabbay, Dove M., & Smets, Philippe (eds), Handbook of Defeasible Reasoning and Uncertainty Management Systems, vol. 1. Kluwer Academic Publishers.

Smets, Philippe, & Kennes, Robert. 1990. Constructing the Pignistic Probability Function in a Context of Uncertainty. Uncertainty in Artif. Intell., 5, 29–39.

Solum, L. B. (1992). "Legal Personhood for Artificial Intelligences." North Carolina Law Review 70 (April): 1231-1287

Turing, Alan M. 1950. Computing machinery and intelligence. Mind, 59, 433–460.

Van Tilburg, Henk C.A., editor-in-chief (2005) Encyclopedia of Cryptography and Security, Springer, ISBN-13: 978-0387-23473-1 

 

 

Conclusion  fidis-wp2-del2.13_Virtual_Persons_v1.0.sxw  
23 / 23