Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- D2.1: Inventory of Topics and Clusters.
- D2.2: Set of use cases and scenarios.
- D2.3: Models.
- D2.6: Identity in a Networked World – Use Cases and Scenarios.
- D2.13: Virtual Persons and Identities.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- Identity of Identity.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D2.2: Set of use cases and scenarios
References
Asokan N., Shoup Victor, and Waidner Michael (1998); “Asynchronous protocols for optimistic fair exchange”, IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, 86-99, 1998.
Chaum David (1984); “Showing credentials without identification. Signatures transferred between unconditionally unlinkable pseudonyms”. EUROCRYPT 85, LNCS 219, Springer-Verlag, Heidelberg 1986, pp. 241-244.
Clauß Sebastian, Köhntopp Marit (2001): “Identity Managements and Its Support of Multilateral Security”; in: Computer Networks 37 (2001), Special Issue on Electronic Business Systems; Elsevier, North-Holland 2001; 205-219.
Clauß Sebastian, Pfitzmann Andreas, Hansen Marit, Van Herreweghen, Els (2002); “Privacy-Enhancing Identity Management”; The IPTS Report 67 (September 2002) 8-16.
Dellarocas, Chrysanthos (2000); “Immunizing Online Reputation Reporting Systems Against Unfair Ratings and Discriminatory Behavior”; Proceedings of the 2nd ACM Conference on Electronic Commerce, October 2000.
eBay. Annual report 2003. available from http://investor.ebay.com/annual.cfm, 2003.
Federal Trade Commission (2003). “Internet auction fraud targeted by law enforcers”. available from http://www.ftc.gov/opa/2003/04/bidderbeware.htm, 2003.
Graeme Wearden (2004); “Judge raps eBay over fraud”, December 7, 2004. http://news.com.com/2102-1038_3-5481601.html
Harris Interactive (2002). “First major post-9/11 privacy survey finds consumers demanding companies do more to protect privacy”. Rochester Feb. 2002, http://www.harrisinteractive.com/news/allnewsbydate.asp?NewsID=429.
Köhntopp Marit and Pfitzmann Andreas (2004); “Anonymity, unobservability, and pseudonymity - a proposal for terminology”. Draft v0.20., September 2004, available from http://dud.inf.tu-dresden.de/Literatur_V1.shtml (v0.5 and all succeeding versions).
Kollock Peter (1999); “The production of trust in online markets”. Advances in Group Processes (Vol. 16), Greenwich, CT: JAI Press., 1999.
Pew Internet & American Life Project (2000); “Trust amd privacy online: why americans want to rewrite the rules”. http://pewinternet.org/reports/loc.asp?Report=19, 2000-08-20.
Steinbrecher Sandra (2004); “Balancing Privay and Trust in Electronic Marketplaces”, DEXA Conference on Trust and Privacy in Digital Business, LNCS 3184, Springer Verlag Berlin, pp. 70-79.
Waidner Michael (1996); “Development of a secure electronic marketplace for Europe”. ESORICS 96, LNCS 1146, Springer-Verlag Heidelberg, pp. 1-14.
62 / 69 |