You are here: Resources > FIDIS Deliverables > Privacy and legal-social content > D14.3: Study on the Suitability of Trusted Computing to support Privacy in Business Processes > 
Results  Title:
BIBLIOGRAPHY
 

 

Bibliography

Rafael Accorsi. Towards a Secure Logging Mechanism for Dynamic Systems. In: Proceedings of the 7th IT Security Symposium. 2005. 

Ammar Alkassar and Rani Husseiki (Eds.). FIDIS deliverable D3.9 “Study on the Impact of Trusted Computing on Identity and Identity Management”. FIDIS NoE Consortium – EC Contract No. 507512. 6th Framework Application of European Commission. 2007.

Ross Anderson. Cryptography and competition policy: Issues with "Trusted Computing". In Proceedings of the 22nd Annual ACM Symposium on Principles of Distributed Computing (PODC-03), pages 3-10, New York, July 2003. ACM Press. 

Ross Anderson. ‘Trusted Computing’ Frequently Asked Questions TC / TCG / lagrande / NGSCB / longhorn / palladium / TCPA. World-Wide Web document, August 2003. 

ARM. TrustZone Technology - Secure extension to the ARM architecture. http://www.arm.com, 2004. 

Paul Ashley, Satoshi Hada, Günter Karjoth, Calvin Powers and Matthias Schunter. Enterprise Privacy Authorization Language (EPAL). http://www.zurich.ibm.com/security/enterpriseprivacy/epal/specification, IBM Research, 2003. Last accessed on May, 21st 2007.

Matthias Bauer, Martin Meints and Marit Hansen (eds.). FIDIS deliverable D3.1 “Structured Overview on Prototypes and Concepts of Identity Management Systems”. FIDIS NoE Consortium – EC Contract No. 507512. 6th Framework Application of European Commission. 2005.  

Andreas Bogk, Rüdiger Weis and Stefan Lucks. TCG 1.2 - fair play with the ‘fritz’ chip? In SANE 2004: Proceedings of the 4th International System Administration and Network Engineering Conference, 2004. 

Robin Burke. Hybrid recommender systems: Survey and experiments. User Modeling and User-Adapted Interaction, 12(4):331–370, 2002. 

Iris Bohnet and Steffen Huck. Repetition and Reputation: Implications for Trust and Trustworthiness in the Short and in the Long Run. Technical report, KSG, November 2003. Working Paper No. RWP03-048. 

Ernie Brickell, Jan Camenisch and Liqun Chen. Direct anonymous attestation. In CCS ‘04: Proceedings of the 11th ACM conference on Computer and communications security, pages 132-145, New York, NY, USA, 2004. ACM Press. 

David Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM 24(2). p. 84–88. 1981. 

Lorrie Cranor and Paul Resnick. Protocols for Automated Negotiations with Buyer Anonymity and Seller Reputations. Netnomics, 2(1):1-23, 2000. 

Lorrie Cranor, Marc Langheinrich, Massimo Marchiori, Martin Presler-Marshall and Joseph Reagle. The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. http://www.w3.org/TR/P3P, April 2002. Last accessed on December 12th 2007.

Mukund Deshpande and George Karypis. Item-based top-N recommendation algorithms. ACM Trans. Inf. Syst., 22(1):143–177, 2004. 

Tim Dierks and Cristopher Allen. RFC 2246: The TLS Protocol Version 1.0, 1999. 

Enterprise Strategy Group. Liquid Machines: Enterprise Rights Management: A Superior Approach to Confidential DataSecurity, 2006. 

Simone Fischer-Hübner and Hand Hedbom (eds.). FIDIS deliverable D12.3 “A Holistic Privacy Framework for RFID Applications”. FIDIS NoE Consortium – EC Contract No. 507512. 6th Framework Application of European Commission. 2007. 

Stefan Fricke, Karsten Bsufka, Jan Keiser, Torge Schmidt, Ralf Sesseler and Sahin Albayrak. Agent-based telematic services and telecom applications. Communications of the ACM, 44(4), April 2001. 

Mark Gasson and Kevin Warwick (eds.). FIDIS deliverable D12.2 “Study on Emerging AmI Technologies”. FIDIS NoE Consortium – EC Contract No. 507512. 6th Framework Application of European Commission. 2007. 

Oded Goldreich. Zero-knowledge twenty years after its invention.  http://citeseer.ist.psu.edu/goldreich02zeroknowledge.html, 2002.

Oded Goldreich, Silvio Micali and Avi Wigderson. How to play any mental game. In Proc. of STOC ’87, pages 218–229, New York, NY, USA, 1987. ACM Press. 

Adolf Hohl and Alf Zugenmaier. Safeguarding Personal Data with DRM in Pervasive Computing. In Robinson, P., Vogt, H., Wagealla, W., eds.: Privacy, Security and Trust within the Context of Pervasive Computing. Volume 780 of The International Series in Engineering and Computer Science., Springer. 2005. 

Alexander Iliev and Sean W. Smith: Protecting Client Privacy with Trusted Computing at the Server. IEEE Security and Privacy, Volume 3, Issue 2 (March 2005), IEEE Educational Activities Department, New York, USA, 20–28. 

Uwe Jendricke. Sichere Kommunikation zum Schutz der Privatsphäre durch Identitätsmanagement. Rhombos-Verlag, January 2003. 

Rebecca T. Mercuri. On auditing audit trails. Communications of ACM, 46(1):17-20, 2003. 

D. Molnar, A. Soppera, and D. Wagner: Privacy for RFID through Trusted Computing (short paper). In S. De Capitani di Vimercati and R. Dingledine, editors, Workshop on Privacy in the Electronic Society (WPES), 2005. 

Günter Müller and Sven Wohlgemuth (eds.). FIDIS deliverable D14.2 “Study on Privacy in Business Processes by Identity Management”. FIDIS NoE Consortium – EC Contract No. 507512. 6th Framework Application of European Commission. 2007. 

Andrew C. Myers and Barbara Liskov. Protecting Privacy using the Decentralized Label Model. ACM Transactions on Software Engineering and Methodology 9. p. 410–442. 2000. 

Jan Poritz, Matthias Schunter, Els Van Herreweghen and Michael Waidner. Property based attestation - scalable and privacy-friendly security assessment of peer computers. Technical Report RZ3548, IBM Corporation, 2004. 

Alexander Pretschner, Manuel Hilty and David Basin: Distributed usage control. In Communications of the ACM 49(9). Special Issue “Privacy and security in highly dynamic systems”. p. 39—44. ACM Press. 2006. 

Kai Rannenberg, Andreas Pfitzmann and Günter Müller. IT Security and Multilateral Security. In Günter Müller and Kai Rannenberg (eds.). Technology, Infrastructure, Economy, volume 3 of Multilateral Security in Communications, pages 21—29. Addison Wesley Longman Verlag GmbH, 1999.

Aviel D. Rubin and Daniel E. Geer Jr. Mobile Code Security. IEEE Internet Computing, 2(6):30-34, 1998. 

Stefan Sackmann and Jens Strüker. Electronic Commerce Enquête 2005 – 10 Jahre Electronic Commerce: Eine stille Revolution in deutschen Unternehmen. Technical Report, Institute of Computer Science and Social Studies (Telematics), Freiburg I.Br., 2005. 

Stefan Sackmann, Jens Strüker and RafaelAccorsi. Personalization in Privacy-Aware Highly Dynamic Systems. Communications of the ACM 49(9), p. 32–38, 2006.

Bruce Schneier and John Kelsey. Security audit logs to support computer forensics. ACM Transactions on Information and System Security, 2(2):159–176, May 1999. 

Gustavus J. Simmons. The prisoners’ problem and the subliminal channel. In David Chaum (ed.) Proceedings of Crypto ’83, pages 51–67. Plenum Press, 1984. 

Vincent Simonet. Fine-grained Information Flow Analysis for a lambda-calculus with Sum Types. In: Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW 15), Cape Breton, Nova Scotia (Canada). P. 223–237. 2002. 

Latanya Sweeney. k-Anonymity: A Model for Protecting Privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10. p. 557–570. 2002. 

Herbert H. Thompson. Why Security Testing is Hard. Security & Privacy Magazine, IEEE, 1(4):83{86, August 2003. 

Transmeta Corporation. Transmeta Announces First Embedded Security Features for x86 Microprocessors. http://investor.transmeta.com/news/20030114-99407.cfm, 2003. 

Trusted Computing Group. TCG Backgrounder. https://www.trustedcomputinggroup.org, May 2003. 

Trusted Computing Group. Trusted Computing Group TPM Specifcation Version 1.2. https://www.trustedcomputinggroup.org, 2003. 

Trusted Computing Group. Bylaws of Trusted Computing Group. https://www.trustedcomputinggroup.org/about/articles_of_incorporation.pdf, 2003. 

Tse, S., Zdancewic, S. Run-time Principals in Information-flow Type Systems. In: IEEE Symposium on Security and Privacy. 2004. 

Sven Wohlgemuth and Gü̈nter Müller. Privacy with Delegation of Rights by Identity Management. In Günter Müller (ed.), Emerging Trends in Information and Communication Security, International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006, Volume 3995 of Lectures Notes in Computer Science, Heidelberg, Springer, p. 175–190, 2006. 

Tatu Ylönen. SSH - Secure Login Connections over the Internet. Proceedings of the 6th Security Symposium USENIX Association: Berkeley, CA:37, 1996. 

Alf Zugenmaier and Adolf Hohl. Taking the Ubiquitous Administrator out of the Trust Chain. http://citeseer.ist.psu.edu/676940.html, 2004.

 

Results  fidis_wp14_d14.3_v1.0.sxw  
39 / 39