You are here: Resources > FIDIS Deliverables > Mobility and Identity > D11.1: Mobility and Identity > 

D11.1: Collection of Topics and Clusters of Mobility and Identity – Towards a Taxonomy of Mobility and Identity

Index  Title:
BIBLIOGRAPHY
 

 

Bibliography

 

Advirsson, A., On the Pre history of the Panoptic Sort: mobility in market research, Wood D. (ed.), Surveillance and Society, vol. 1, number 4, winter 03/04, pp.456 – 474. Free peer to peer electronical journal available at http://www.surveillance-and-society.org.

 

Agre, P.E., Rotenberg, M., Technology and Privacy. The New Landscape, Cambridge MIT press, 2001.

 

Andersson, C., Martucci, L., Fischer-Hübner, S., Requirements for Privacy-Enhancements for Mobile Ad Hoc Networks, in Cremers, A. B., Manthey, R., Martini, P. Steinhage, V. (eds.), 3rd German Workshop on Ad Hoc Networks (WMAN 2005), Proceedings of INFORMATIK 2005 - Informatik LIVE! Band 2, volume 68 of LNI, pp.344–348. GI, 19th–22nd Sep 2005.

 

Aura, T., ‘Distributed Access-Rights Managements with Delegation Certificates’, Secure Internet Programming, 1999, p. 211-235.

 

Bauer, M., Meints, M., Hansen, M. (eds.), ‘D3.1: Structured Overview on Prototypes and Concepts of Identity Management Systems’, FIDIS Deliverable WP 3, 2005.

 

Beller, M., Leerssen, J., Identity, Imagology. A Handbook on the literary representation of national characters, 2001.

(Note: the handbook should be published in 2006. Some articles are available at the Handbook’s part of the IMAGE website www.cf.hum.uva.nl/images/dtory.identity.pdf). 

 

Bennet, C.J., Crowe, L., Location Based Services and the Surveillance of Mobility: an analysis of privacy risks in Canada, A report to the Office of the Privacy Commissioner of Canada under the 2004 – 2005 Contributions Programs, June 2005 p. 44.

 

Bennet, C.,Regan, P., Editorial. Surveillance and mobilities, Wood D. (ed.), Surveillance and Society, vol. 1 number 4, winter 03/04, pp.449 – 455. Free peer to peer electronical journal available at http://www.surveillance-and-society.org.

 

Blaze, M., Feigenbaum, J. and Lacy, J., ‘Decentralized trust management’, Symposium on Security and Privacy, Los Alamitos, IEEE Computer Society Press, 1996, o. 164-173.

 

Boukerche, A., El-Khatib, K., Xu, L., Korba, L., SDAR: A Secure Distributed Anonymous Routing Protocol for Wireless and Mobile Ad Hoc Networks, in: Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks (LCN’04), pp.618 – 624, 2004.

Brands, S., Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy, MIT Press, 2000.

 

Camenisch, J. and Lysyanskaya, A., Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation, In EUROCRYPT 2001, LNCS, Vol. 2045, Springer, 2001, p. 91-118.

 

Camenisch, J. and Herreweghen, E.V., Design and Implementation of the idemix Anonymous Credential System, In 9th ACM Conference on Computer and Communications Security, ACM Press, 2002, p. 21-30.

 

Cameron, K., Laws of Identity, version of 5/12/2005. See at www.identityblog.com.

 

Capkun, S., Hubaux, J. P., Buttyán, L., Mobility Helps Security in Ad Hoc Networks, in: Proc. 4th ACM Symposium on Mobile Ad Hoc Networking and Computing - MobiHoc’03, Long Beach, CA, USA, Jun. 2003, pp.46-56.

 

Carey, P., E-Privacy and Online Data Protection, Butterworths, 2002.

 

Casassa Mont, M., Identity Management: On the “Identity = Data + Policies” Model, Technical Reports 14 (2004), Technical Publications Department, HP Labs Research Library, Bristol, 2004; download see http://www.hpl.hp.com/techreports/2004/HPL-2004-14.html.

 

Castells, M., The Power of Identity: The Information Age economics, society and culture volume 2, Blackwell Publications Cornwall UK, 1997, p. 537.

 

Castells, M., The Rise of the Network Society, Blackwell Publications New York; 1996, p. 412.

 

Chaum, D., Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms, Communication of the ACM, 24(2): pp.84–88, Feb 1981.

 

Chaum, D., Security without identification: Transaction systems to make big brother obsolete, Communications of the ACM, Vol. 28, 1985, p. 1030-1044.

 

Clarke R., Wireless Transmission and Mobile Technologies, 2003 See at www.anu.edu.au/people/Roger.Clarke/EC/WMT.html.

 

Clauß, S., Köhntopp, M., Identity Management and Its Support of Multilateral Security, Computer Networks 37(2), pp. 205-219, London 2001.

 

Corson, M. S., Macker, J., Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. RFC-2501, Jan 1999. See http://www.ietf.org/rfc/rfc2501.txt.

 

Dammann, U., Simitis, Sp., EG-Datenschutzrichtlinie, Nomos Verlagsgesellschaft, 1997.

 

Dobson, J.E., Fisher, P.F., Geoslavery, IEEE Technology and Society Magazine, Vol. 22, issue 1, 2003, 47 - 52.

 

Douceur, J. R., The Sybil Attack. In Druschel P., Kaashoek, F., and Rowstron, A., (eds.), Peer-to-Peer Systems: Proceedings of the 1st International Peer-to-Peer Systems Workshop (IPTPS), volume 2429, pages 251–260. Springer-Verlag, 7th–8th Mar 2002.

 

Elias N., Was ist Soziologie? Aula Boeken 462. Translated in Dutch by Goudsblom J., Vollers J., Junventa Verlag, 1970, p. 271.

 

Ellison, C., Frantz, B., Lampson, B. et al, SPKI Certificate Theory, Internet Request for Comments 2693, 1999.

 

Erdos, M. and Cantor, S., Shibboleth-Architecture DRAFT v05, http:// hibboleth.internet2.edu/docs/draft-internet2-shibboleth-arch-v05.pdf, accessed at November 2002.

 

Fortunati, L., The mobile phone an identity on the move, Personal and Ubiquitous Computing, Springer Verlag London, Surrey, vol. 5, 2001 pp.85–98.

 

Gasser, M. and McDermott, E., An Architecture for Practical Delegation in a Distributed System, In Proceedings of the 1990 IEEE Symposium on Security and Privacy, 1990, p. 20-30.

 

German Federal Constitutional Court, Volkszählungsurteil, Entscheidungen des Bundesverfassungsgerichts, Vol. 65, 1983.

 

German Government, Federal Data Protection Act, of December 20, 1990 (BGBl.I 1990 S.2954), amended by law of September 14, 1994 (BGBl. I S. 2325), law of December 16, 1997 (BGBl. I S. 2325) and December 17, 1997 (BGBl. I S. 2325), last amendment by law of May 23, 2001.

 

Graham S., Wood D., Digitizing surveillance: categorization, space, inequality. Critical Social Policy, Vol. 23, nr. 2,

 

Geser, H., Towards a sociology of the mobile phone, Online Publications social institute of the University of Zurich, release 3.0. 2004, p. 47. Available at http://socio.ch/mobile/t_geser1.htm

 

GSM Association, GSM Statistics www.gsmworld.com/news/statistics/index.shtml, visited2006-05-06, 2006.

 

Hansen et al., Privacy Enhanced Identity Management, Information Security Technical Report, Vol. 9, number 1, Elsevier, Advanced Technology Oxford, 2004, pp.35–44.

 

Harper, Director Stempec Project, Report on Socio Technological Shaping of Mobile Multi Media Personal Communications, 2002. See at www.surrey.ac.uk/research.

 

Hess, K., Weddige, F., Regelung und Mitbestimmung bei mobiler Arbeit, Computer Fachwissen, pp. 7-11, Bund Verlag, Frankfurt a. M. 2005.

 

Hildebrandt M; Gutwirth S., De Hert P. (eds.), ‘7.4: Implications of profiling practices on democracy and rule of law’, FIDIS Deliverable WP 7D7.4, 2005, p 85.

 

Hildebrandt M; Backhouse J. (eds.), ‘7.2: Descriptive analysis and inventory of profiling practices’, FIDIS Deliverable WP 7 ,2005, 116.

 

Hilty, M., Basin, D. and Pretschner, A., On Obligations, In 10th European Symposium On Research In Computer Security, LNCS, Vol. 3679. Springer, 2005, p. 98-117.

 

Hohl, A. and Zugenmaier, A., Safeguarding Personal Data with DRM in Pervasive Computing. In Philip Robinson, Harald Vogt, and Waleed Wagealla (Eds.), Privacy, Security and Trust within the Context of Pervasive Computing, The International Series in Engineering and Computer Science, Vol. 780, Springer, 2005.

 

Holznagel, B., Sonntag, M., ‘A Case Study: The JANUS Project’ in Nicoll, C., et al (eds.), Digital Anonymity and the Law – Tensions and Dimensions, TMC Asser Press, The Hague, 2003.

 

Hubaux, J. P., Buttyán, L., Capkun, S., The Quest for Security in Mobile Ad Hoc Networks, in: Proc. 2nd ACM Symposium on Mobile Ad Hoc Networking and Computing - MobiHoc’01, Long Beach, CA, USA, Oct. 2001.

 

IETF, Ad Hoc Network Autoconfiguration Working Group. Ad Hoc Network Autoconfiguration (autoconf), 2006. See http://www3.ietf.org/html.charters/autoconf-charter.html.

 

Jendricke, U. and Gerd tom Markotten, D., Usability meets Security - The Identity-Manager as your Personal Security Assistant for the Internet, In Proceedings of the 16th Annual Computer Security Applications Conference, 2000, p. 334-353.

 

Jenkins, Categorization identity, social process and epistemology, Current Sociology vol. 48, number 3, July 2000, pp.7 - 25.

 

Jiang, S., Vaidya, N. H., Zhao, W., A Mix Route Algorithm for Mix-net in Wireless Mobile Ad Hoc Networks, in: Proceedings of the 1st IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS2004), pp.24–27 Oct 2004.

 

Josang et al., Trust requirements in identity management, Montague and Safavi – Naini (Eds.) Australasian Information Security Workshop 2005. Conferences in Research and Practice in Information Technology, vol. 44, 2005, p 99 – 108.

 

Kargl F., Schlott, S., Weber M., Integrierte Sicherheit für Mobile Ad-hoc Netzwerke, in: Proc. 2nd German Workshop on Mobile Ad-Hoc Networks - WMAN 2004, Ulm, Germany, Sep. 2004.

 

Karjoth, G., Schunter, M. and Waidner, M., Platform for Enterprise Privacy Practices: Privacy-enabled Management of Customer Data, In 2nd Workshop on Privacy Enhancing Technologies (PET 2002), LNCS, Vol 2482, Springer, 2003, p. 69-94.

 

Kohl, J. and Neuman, C., The Kerberos Network Authentication Service (V5), Internet Request for Comments 1510, 1993.

 

Kong, J., Hong, X., ANODR: ANonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks, in: Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC’03), pp.291–302.

 

Kuhn, T., The Structure of Scientific Revolutions, University of Chicago Press London, 1962, p 222.

 

Kuner, C., European Data Privacy Law and Online Business, Oxford University Press, 2003.

 

Lasen, A., The social Shaping of fixed and mobile networks: a historical comparison 1, Surrey Vodafone Scholar. Digital World Research Centre, University of Surrey, 2002, p. 44.

 

Liberty Alliance Project, Specifications Phase 2 Version 1.0, http://www.projectliberty.org/resources/phase2_1_0_archive.php, 2005, accessed at November 2005.

 

Luo, H. et al., Self-securing ad hoc wireless networks, in: Proc. 7th IEEE Symposium on Computers and Communications - ISCC 2002, Taormina, Italy, Jul. 2002, pp.567-574.

 

Lyon, D., Surveillance Society: Monitoring Everyday Life, Buckingham: Open University Press, 2001, p. 192.

Nabeth, T., Hildebrandt, M. (Eds.), Inventory on Topics and Clusters, FIDIS Deliverable 2.1, Frankfurt 2004; download see http://www.fidis.net/fidis_del.0.html.

 

Martucci, L. A. et al., A Trust-Based Security Architecture for Small and Medium-Sized Mobile Ad Hoc Networks, in: Proc. 3rd Annual Mediterranean Ad Hoc Networking Workshop - Med-Hoc-Net, Bodrum, Turkey, Jun. 2004, pp.278-290.

 

McDonalds, www.mcdonalds.com/corp/about.html; visited 2006-05-06, 2006. 

 

Microsoft Corporation, Microsoft .NET Passport Review Guide, http://www.microsoft.com/net/services/passport/review_guide.asp, 2003, accessed at November 2005.

 

Microsoft Corporation, Microsoft’s Vision for an Identity Metasystem, http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnwebsrv/html/identitymetasystem.asp, 2005, accessed at November 2005.

Moukas, Al., et al., Agent mediated Electronic Commerce II: Towards Next-Generation Agent-Based Electronic Commerce Systems, Springer, 2000.

 

Müller, G., Wohlgemuth, S., (eds.), Deliverable 3.3: Study on mobile identity management, FIDIS Work Package 3, 2005, p. 90.

 

Neuman, B.C, Proxy-Based Authorization and Accounting for Distributed Systems, In Proceedings of the 13th International Conference on Distributed Computing Systems, Pittsburgh, 1993, p. 283-291.

 

Pfitzmann, B. and Waidner, M., Federated Identity-Management Protocols, In 11th International Workshop on Security Protocols (2003), LNCS 3364, Springer, 2005, p. 153-174.

 

Rannenberg, K., Identity management in mobile cellular networks and related applications, in: Information Security Technical Report, Vol. 9, No. 1, 2004, pp.77-85, ISSN 1363-4127.

 

Reichenbach, M., Damker, H., Federrath, H., Rannenberg, K., Idividual Management of Personal Reachability in Mobile Communication, in Yngström, L., Carlsen, J. (Eds.), Information Security in Research and Business, pp. 164-174, Chapman & Hall, London 1997; download see http://www.wiiw.de/publikationen/IndividualManagementofPersonal.pdf

 

Reiter, M., Rubin, A., Crowds: Anonymity for Web Transactions, in: DIMACS Technical report, pp.97–115, 1997.

 

Ricoeur, P., Oneself as another, Chicago: Chicago University Press 1992.

 

Rodriguez, Casal, C., Burgelman, J.C., Carart, G., The Future of Mobile Communications in the EU: Assessing the potential of 4G. Sevilla European Communities, Technical report series 21192 EN, 2004, p. 20. Available at ftp://ftp.jrc.es/pub/EURdoc/eur20823en.pdf.

 

Roussos, G., Peterson, D, Patel, U., Mobile Identity Management: An Enacted View, Int. Jour. E-Commerce, Vol. 8, No. 1, 2003, pp. 81-100, download see http://www.dcs.bbk.ac.uk/~gr/pdf/ijec-mid.pdf

 

Saärenpaä, A., The constitutional state and digital identity, Paper available on the website of the 2002 World Congress for Informatics and Law II Spain September 23rd–27th http://www.ieid.org/congreso/ponencia_i.htm

 

Schiller, J., Voisard, A., Location-Based Services, Elsevier, San Francisco, 2004. 

 

Seys, S., Preneel, B., ARM: Anonymous Routing Protocol for Mobile Ad Hoc Networks, in International Workshop on Pervasive Computing and Ad Hoc Communications (PCAC06), Proceedings of the 20th IEEE International Conference on Advanced Information Networking and Applications (AINA 2006). IEEE Computer Society Press, 18th-19th Apr 2006.

 

Sorokin P; Social and Cultural Mobility. New York: The Free Press, 1959.

 

Stajano, F. and Anderson, R., The resurrecting duckling: security issues for ad hoc wireless networks, in: Proc. 3rd AT&T Software Symposium, Middletown, NJ, USA, Oct. 1999.

 

Urry, J., Mobile Sociology, British Journal of Sociology, Blackwell Synergy, LSE, vol. 51, 2000, number 1, pp.185-203.

 

Vincke, J., Sociologie. Een Klassieke Theoretische Inleiding, UGent Press Gent,1998.

 

Walden, I., Data Protection, in: Reed C., Angel J., Computer Law, 5th edition, Oxford University Press, 2003.

 

Weiss, H., Mobil und kommunikativ, Computer Fachwissen, pp. 12-13, Bund Verlag, Frankfurt a. M. 2005.

 

Welch, V., Foster, I., Kesselman, C. et al., X.509 Proxy Certificates for Dynamic Delegation, In 3rd Annual PKI R&D Workshop, 2004.

 

Zhang, Y., Liu, W., Lou, W., Anonymous Communication in Mobile Ad Hoc Networks, in Proceedings of the 24th Annual Joint Conference of the IEEE (INFOCOM 2005), Miami, FL, USA, 13th–17th Mar 2005.

 

Zhou, L., Haas, Z. J., Securing Ad Hoc Networks, IEEE Network, vol. 13, i.6, pp.24-30, Nov./ Dec. 1999.

 

Zugenmaier, A., FLASCHE – A Mechanism Providing Anonymity for Mobile Users, in: Martin, D., Serjantov, D. (Eds.): Privacy Enhancing Technologies, 4th International Workshop, PET 2004, Springer-Verlag Berlin Heidelberg, 2005

 

Index  fidis-wp11-del11.1.mobility_and_identity_03.sxw  
Denis Royer 58 / 58