{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:14:15Z","timestamp":1725538455372},"publisher-location":"Berlin, Heidelberg","reference-count":60,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540884804"},{"type":"electronic","value":"9783642018206"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01820-6_4","type":"book-chapter","created":{"date-parts":[[2009,9,18]],"date-time":"2009-09-18T12:02:59Z","timestamp":1253275379000},"page":"130-189","source":"Crossref","is-referenced-by-count":8,"title":["High-Tech ID and Emerging Technologies"],"prefix":"10.1007","author":[{"given":"Martin","family":"Meints","sequence":"first","affiliation":[]},{"given":"Mark","family":"Gasson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Adler, A. (2003), \u2018Can images be regenerated from biometric templates?\u2019, Biometrics Conference, Washington.","key":"4_CR1_4"},{"unstructured":"Alkassar, A. and Husseiki, R. (eds.) (2008), FIDIS Deliverable D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management, Download: http:\/\/www.fidis. net\/fileadmin\/fidis\/deliverables\/fidis-wp3-del3.9_Study_on_the_Impact_of_Trusted_Computing_on_Identity_and_Identity_Management.pdf .","key":"4_CR2_4"},{"doi-asserted-by":"crossref","unstructured":"Alrodhan, W. A. and Mitchell, C. J. (2007), \u2018Addressing privacy issues in CardSpace\u2019, Third International Symposium on Information Assurance and Security (IAS 2007), IEEE Computer Society, pp. 285\u2013291.","key":"4_CR3_4","DOI":"10.1109\/IAS.2007.12"},{"unstructured":"Article 29 Data Protection Working Party (Art29DPWP) (2003), Working Document on Biometrics, WP 80, Brussels. http:\/\/ec.europa.eu\/justice_home\/fsj\/privacy\/docs\/wpdocs\/2003\/wp80_en.pdf .","key":"4_CR4_4"},{"unstructured":"Article 29 Data Protection Working Party (Art29DPWP) (2004), Opinion on More Harmonised Information Provisions, WP 100, Brussels. http:\/\/ec.europa.eu\/justice_home\/fsj\/privacy\/docs\/wpdocs\/2004\/wp100_en.pdf .","key":"4_CR5_4"},{"unstructured":"Article 29 Data Protection Working Party (Art29DPWP) (2005), Working document on data protection issues related to RFID technology, WP 105, Brussels. http:\/\/www.eu.int\/comm\/justice_home\/fsj\/privacy\/docs\/wpdocs\/2005\/wp105_en.pdf .","key":"4_CR6_4"},{"unstructured":"Ballinger, K., Bissett, B., Box, D., Curbera, F., Ferguson, D., Graham, S., Liu, C. K., Ley-mann, F., Lovering, B., McCollum, R., Nadalin, A., Orchard, D., Parastatidis, S., von Riegen, C., Schlimmer, J., Shewchuk, J., Smith, B., Truty, G., Vedamuthu, A., Weer-awarana, S., Wilson, K., Yendluri, P. (2006), Web Services Metadata Exchange (WS-MetadataExchange), BEA Systems Inc., Computer Associates International, Inc., International Business Machines Corporation, Microsoft Corporation, Inc., SAP AG, Sun Microsystems, and webMethods. Specification Version 1.1.","key":"4_CR7_4"},{"doi-asserted-by":"crossref","unstructured":"Baran, P. (1964), \u2018On Distributed Communications: IX. Security, Secrecy, and Tamper-Free Considerations,\u2019 Memorandum RM-3765-PR, The Rand Corporation, 1700 Main St, Santa Monica, California, 90406. Reprinted in Hoffman L. J. (ed.): Security and Privacy in Computer Systems; Melville Publishing Company, Los Angeles, California, 1973, pp. 99\u2013123. http:\/\/www.rand.org\/pubs\/research_memoranda\/RM3765\/ .","key":"4_CR8_4","DOI":"10.7249\/RM3765"},{"unstructured":"Bauer, M., Meints, M., Hansen, M. (eds.) (2005), FIDIS Deliverable D3.1 Structured Overview on Prototypes and Concepts of Identity Management Systems, Download: http:\/\/www.fidis.net\/fileadmin\/fidis\/deliverables\/fidis-wp3-del3.1.overview_on_IMS.final.pdf .","key":"4_CR9_4"},{"key":"4_CR10_4","volume-title":"SecPAL: Design and Semantics of a Decentralized Authorization Language, Technical Report MSR-TR-2006-120","author":"M. Y. Becker","year":"2006","unstructured":"Becker, M. Y., Gordon, A. D., Fournet, C. (2006), SecPAL: Design and Semantics of a Decentralized Authorization Language, Technical Report MSR-TR-2006-120, Microsoft Research, Redmond."},{"unstructured":"Bizer, J. and Spiekermann, S. (2006), TAUCIS \u2014 Technikfolgenabsch\u00e4tzung Ubiquit\u00e4res Computing und Informationelle Selbstbestimmung, study commissioned by the German Federal Ministry of Education and Research, Berlin. https:\/\/www.datenschutzzentrum.de\/taucis\/ita_taucis.pdf","key":"4_CR11_4"},{"unstructured":"Buitelaar, J.C., Meints, M., van Alsenoy, B. (eds.) (2008), FIDIS Deliverable D16.1: Conceptual Framework for Identity Management in eGovernment, Download: http:\/\/www.fidis.net\/fileadmin\/fidis\/deliverables\/fidis-wp16-del16.1-conceptual_framework_for_identity_management_in_egovernment.pdf .","key":"4_CR12_4"},{"key":"4_CR13_4","volume-title":"Web Services Architecture and Its Specifications: Essentials for Understanding WS-*","author":"L. F. Cabrera","year":"2005","unstructured":"Cabrera, L. F. and Kurt, C. (2005), Web Services Architecture and Its Specifications: Essentials for Understanding WS-*, Microsoft Press, Redmond."},{"unstructured":"Cameron, K. (2005), The Laws of Identity, published as weblog. http:\/\/www.identityblog.com\/stories\/2005\/05\/13\/TheLawsOfIdentity.pdf .","key":"4_CR14_4"},{"doi-asserted-by":"crossref","unstructured":"Cavoukian, A. and Stoianov, A. (2007), Biometric Encryption, Ontario, Canada. http:\/\/www.ipc.on.ca\/images\/Resources\/up-1bio_encryp.pdf .","key":"4_CR15_4","DOI":"10.1016\/S0969-4765(07)70084-X"},{"unstructured":"Coulouris, G., Dollimore, J., Kindberg, T. (2005), Distributed Systems. Concepts and Design, Addison Wesley.","key":"4_CR16_4"},{"key":"4_CR17_4","first-page":"298","volume-title":"Sicherheit 2005: Sicherheit\u2014Schutz und Zuverl\u00e4ssigkeit, Beitr\u00e4ge der 3. Jahrestagung des Fachbereiches Sicherheit der Gesellschaft f\u00fcr Informatik e.V. (GI)","author":"D. DeCock","year":"2006","unstructured":"De Cock, D., Wolf, C., Preneel, B. (2006), \u2018The Belgian Electronic Identity Card (Overview)\u2019, in Sicherheit 2005: Sicherheit\u2014Schutz und Zuverl\u00e4ssigkeit, Beitr\u00e4ge der 3. Jahrestagung des Fachbereiches Sicherheit der Gesellschaft f\u00fcr Informatik e.V. (GI), Lecture Notes in Informatics (LNI), Bonner K\u00f6llen Verlag, Bonn, pp. 298\u2013301. http:\/\/www. cosic.esat.kuleuven.be\/publications\/article-769.pdf ."},{"unstructured":"Fischer-H\u00fcbner, S. and Hedbom, H. (eds.) (2008), FIDIS Deliverable D12.3: A Holistic Privacy Framework for RFID Applications, Download: http:\/\/www.fidis.net\/fileadmin\/fidis\/deliverables\/fidis-wp12-del12.3.A_Holistic_Privacy_Framework_for_RFID_Appli-cations_v2.pdf .","key":"4_CR18_4"},{"unstructured":"Gasson, M. and Warwick, K. (eds.) (2007), FIDIS Deliverable D12.2: Study on Emerging AmI Technologies, Download: http:\/\/www.fidis.net\/fileadmin\/fidis\/deliverables\/fidis-wp12-d12.2_Study_on_Emerging_AmI_Technologies.pdf .","key":"4_CR19_4"},{"unstructured":"Gasson, M., Meints, M., Warwick, K. (eds.) (2005), FIDIS Deliverable D3.2 A Study on PKI and Biometrics, Download: http:\/\/www.fidis.net\/fileadmin\/fidis\/deliverables\/fidis-wp3-del3.2.study_on_PKI_and_biometrics.pdf .","key":"4_CR20_4"},{"unstructured":"Geradts, Z. and Sommer, P. (eds.) (2006), FIDIS Deliverable D6.1: Forensic Implications of Identity Management Systems, Download: http:\/\/www.fidis.net\/fileadmin\/fidis\/deli-verables\/fidis-wp6-del6.1.forensic_implications_of_identity_management_systems.pdf .","key":"4_CR21_4"},{"unstructured":"Grimm, R., Puchta, S., M\u00fcller, M., Bizer, J., M\u00f6ller, J., Will, A., M\u00fcller, A., Jazdejewski, S., (2005), Privacy4DRM, Study commissioned by the German Federal Ministry of Education and Research, Berlin. https:\/\/www.datenschutzzentrum.de\/drm\/privacy4drm.pdf .","key":"4_CR22_4"},{"unstructured":"Goodner, M., Hondo, M., Nadalin, A., McIntosh, M. Schmidt, D. (2007), Understanding WS-Federation, Technical Report, IBM and Microsoft Corporation.","key":"4_CR23_4"},{"key":"4_CR24_4","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.istr.2004.11.001","volume":"10","author":"C. Geuer-Pollmann","year":"2005","unstructured":"Geuer-Pollmann, C. and Claessens, J. (2005), \u2018Web services and web service security standards\u2019, Information Security Technical Report, Vol. 10, pp. 15\u201324.","journal-title":"Information Security Technical Report"},{"unstructured":"Hansen, M. and Alkassar, A. (eds.) (2008), FIDIS Deliverable D3.8 Study on protocols with respect to identity and identification \u2014 an insight on network protocols and privacy-aware communication, Download: http:\/\/www.fidis.net\/fileadmin\/fidis\/deliverables\/fidis-wp3-del3.8_Study_on_protocols_with_respect_to_identity_and_identification.pdf .","key":"4_CR25_4"},{"unstructured":"Hansen, M., Krasemann, H., Krause, C., Rost, M., Genghini, R. (2003), Identity Management Systems (IMS): Identification and Comparison Study, Kiel. https:\/\/www.daten-schutzzentrum.de\/idmanage\/study\/ICPP_SNG_IMS-Study.pdf .","key":"4_CR26_4"},{"unstructured":"Hansen, M. and M\u00f6ller, J. (2005), \u2018Digital Rights Management zwischen Sicherheit und informationeller Selbstbestimmung\u2019, in: Bundesamt f\u00fcr Sicherheit in der Informations-technik (BSI, ed.): IT-Sicherheit geht alle an!, proc. of the 9. German IT-Security congress of the BSI, pp. 159\u2013171. http:\/\/www.datenschutzzentrum.de\/vortraege\/050510_hansen-moeller_bsi.htm","key":"4_CR27_4"},{"key":"4_CR28_4","first-page":"98","volume":"12","author":"B. Heinz","year":"2007","unstructured":"Heinz, B., Kri\u00dfler, J., R\u00fctten, C. (2007), \u2018Fingerspitzengef\u00fchl\u2019, c't Magazin f\u00fcr Computer-technik 12, pp. 98\u2013101.","journal-title":"c't Magazin f\u00fcr Computer-technik"},{"doi-asserted-by":"crossref","unstructured":"Hildebrandt, M. and Gutwirth, S. (eds.) (2008), Profiling the European Citizen. Springer.","key":"4_CR29_4","DOI":"10.1007\/978-1-4020-6914-7"},{"unstructured":"Hildebrandt, M. and Koop, B. (eds.) (2007), FIDIS Deliverable D7.9: A Vision of Ambient Law, Download: http:\/\/www.fidis.net\/fileadmin\/fidis\/deliverables\/fidis-wp7-d7.9_A_Vision_of_Ambient_Law.pdf .","key":"4_CR30_4"},{"unstructured":"Hildebrandt, M. and Meints, M. (eds.) (2006), FIDIS Deliverable D7.7: RFID, Profiling, and AmI, Download: http:\/\/www.fidis.net\/fileadmin\/fidis\/deliverables\/fidis-wp7-del7.7.RFID_Profiling_AMI.pdf .","key":"4_CR31_4"},{"key":"4_CR32_4","volume-title":"Risk of Masquerade Arising from the Storage of Biometrics, Department of Computer Science","author":"C. J. Hill","year":"2001","unstructured":"Hill, C. J. (2001), Risk of Masquerade Arising from the Storage of Biometrics, Department of Computer Science, Australian National University, Canberra\/Australia."},{"doi-asserted-by":"crossref","unstructured":"Humphrey, M., Park, S., Feng, J., Beekwilder, N., Wasson, G., Hogg, J., LaMacchia, B., Dillaway, B. (2007), \u2018Fine-grained access control for GridFTP using SecPAL\u2019, 8th IEEE\/ACM International Conference on Grid Computing, IEEE Computer Society, pp. 217\u2013225.","key":"4_CR33_4","DOI":"10.1109\/GRID.2007.4354136"},{"issue":"2","key":"4_CR34_4","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MSP.2005.49","volume":"3","author":"A. Iliev","year":"2005","unstructured":"Iliev, A. and Smith, S. W. (2005), \u2018Protecting Client Privacy with Trusted Computing at the Server\u2019, IEEE Security and Privacy 3 (2), pp. 20\u201328.","journal-title":"IEEE Security and Privacy"},{"unstructured":"Jacobs, I. (2002), Architectural Principles of the World Wide Web, W3C Working Draft, 30 August 2002 (outdated). http:\/\/www.w3.org\/TR\/2002\/WD-webarch-20020830\/ .","key":"4_CR35_4"},{"doi-asserted-by":"crossref","unstructured":"Jain, A. K., Nandakumar, K., Nagar, A. (2008), \u2018Biometric Template Security\u2019, to appear in EURASIP Journal on Advances in Signal Processing. http:\/\/biometrics.cse.msu.edu\/Publications\/SecureBiometrics\/JainNandakumarNagar_TemplateSecuritySurvey_EURASIP08.pdf .","key":"4_CR36_4","DOI":"10.1155\/2008\/579416"},{"key":"4_CR37_4","first-page":"5","volume":"IX","author":"A. Kerckhoffs","year":"1883","unstructured":"Kerckhoffs, A. (1883), \u2018La cryptographie militaire\u2019, Journal des sciences militaires IX, pp. 5\u201338 and pp. 161\u2013191.","journal-title":"Journal des sciences militaires"},{"issue":"3","key":"4_CR38_4","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/s11623-007-0064-6","volume":"31","author":"E. Kindt","year":"2007","unstructured":"Kindt, E. (2007), \u2018Biometric applications and the data protection legislation,\u2019 Datenschutz und Datensicherheit 31 (3), pp. 166\u2013170.","journal-title":"Datenschutz und Datensicherheit"},{"unstructured":"Kindt, E. and M\u00fcller, L. (eds.) (2007), FIDIS Deliverable D3.10: Biometrics in identity management, Download: http:\/\/www.fidis.net\/fileadmin\/fidis\/deliverables\/fidis-wp3-del3.10.biometrics_in_identity_management.pdf .","key":"4_CR39_4"},{"unstructured":"Kosta, E.and Gasson, M. (eds.) (2008), FIDIS Deliverable D12.6: A Study on ICT Implants, Download: http:\/\/www.fidis.net\/fileadmin\/fidis\/deliverables\/fidis-wp12-del12.6.A_Study_on_ICT_Implants.pdf .","key":"4_CR40_4"},{"key":"4_CR41_4","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/978-0-387-72367-9_42","volume-title":"New Approaches for Security, Privacy and Trust in Complex Environments, proc. of the IFIP SEC2007","author":"E. Kosta","year":"2007","unstructured":"Kosta, E., Gasson, M., Hansen, M., Meints, M. (2007), \u2018An analysis of security and privacy issues relating to RFID enabled ePassports\u2019, in New Approaches for Security, Privacy and Trust in Complex Environments, proc. of the IFIP SEC2007, Springer, New York pp. 467\u2013472."},{"unstructured":"Kumaraguru, P., Cranor, L., Lobo, J., Calo, S. (2007), \u2018A Survey of Privacy Policy Languages\u2019, SOUPS 2007, Pittsburgh, PA, USA. http:\/\/cups.cs.cmu.edu\/soups\/2007\/work-shop\/Privacy_Policy_Languages.pdf .","key":"4_CR42_4"},{"unstructured":"Lawrence, K., Kaler, C., Nadalin, A., Goodner, M., Gudgin, M., Barbir, A., Granqvist, H. (2008), WS-SecurityPolicy 1.3, OASIS Editor Draft 1.","key":"4_CR43_4"},{"unstructured":"Lawrence, K., Kaler, C., Nadalin, A., Kaler, C., Monzillo, R., Hallam-Baker, P. (2006), Web Services Security: SOAP Message Security 1.1 (WS-Security 2004), OASIS Specification.","key":"4_CR44_4"},{"key":"4_CR45_4","volume-title":"Code and other laws of cyberspace","author":"L. Lessig","year":"1999","unstructured":"Lessig, L. (1999), Code and other laws of cyberspace, Basic Books, New York."},{"key":"4_CR46_4","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSP.2008.50","volume":"6","author":"E. Maler","year":"2008","unstructured":"Maler, E. and Reed, D. (2008), \u2018The Venn of Identity: Options and Issues in Federated Identity Management\u2019, IEEE Security & Privacy 6, pp. 16\u201323.","journal-title":"IEEE Security & Privacy"},{"issue":"3","key":"4_CR47_4","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1017\/S0963180107070326","volume":"16","author":"E. M. McGee","year":"2007","unstructured":"McGee, E. M., Maguire, G. Q. (2007), \u2018Becoming borg to become immortal: regulating brain implant technologies,\u2019 Camb Q Healthc Ethics 16 (3), pp. 291\u2013302.","journal-title":"Camb Q Healthc Ethics"},{"unstructured":"Meints, M. and Hansen, M. (eds.) (2006), FIDIS Deliverable D3.6: Study on ID Documents, Download: http:\/\/www.fidis.net\/fileadmin\/fidis\/deliverables\/fidis-wp3-del3.6.study_on_id_documents.pdf .","key":"4_CR48_4"},{"key":"4_CR49_4","first-page":"31","volume-title":"Proceedings of the Sicherheit 2008, 2\u20134 of April 2008 in Saarbr\u00fccken","author":"M. Meints","year":"2008","unstructured":"Meints, M. and Hansen, M. (2008), \u2018Der ePass\u2014eine Sicherheits- und Datenschutzanalyse\u2019, in: Proceedings of the Sicherheit 2008, 2\u20134 of April 2008 in Saarbr\u00fccken, Gesellschaft f\u00fcr Informatik, Bonn, pp. 31\u201343."},{"unstructured":"M\u00fcller, G. and Wohlgemuth, S. (eds.) (2007), FIDIS Deliverable D14.2: Study on Privacy in Business Processes by Identity Management, Download: http:\/\/www.fidis.net\/fileadmin\/fidis\/deliverables\/fidis-wp14-del14.2-study_on_privacy_in_business_processes_by_identity_management.pdf .","key":"4_CR50_4"},{"unstructured":"M\u00fcller, G and Wohlgemuth, S. (eds.) (2008), FIDIS Deliverable D14.3: Study on the Suitability of Trusted Computing to support Privacy in Business Processes, Download: http:\/\/www.fidis.net\/fileadmin\/fidis\/deliverables\/fidis-wp14-del14.3_Study_on_the_Suit-ability_of_Trusted_Computing_to_support_Privacy_in_Business_Processes.pdf .","key":"4_CR51_4"},{"unstructured":"Nadalin, A., Goodner, M., Gudgin, M., Barbir, A., Granqvist, H. (2008), OASIS WS-Trust 1.4, OASIS.","key":"4_CR52_4"},{"unstructured":"Pettersson, J. S. and Meints, M. (eds.) (2009), FIDIS Deliverable D3.12: Study on Usability of Identity Management Systems, to appear March 2009.","key":"4_CR53_4"},{"unstructured":"Pfitzmann, A. and Hansen, M., Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management, TU Dresden, Dresden, February 2008. http:\/\/dud.inf.tu-dresden.de\/literatur\/Anon_Terminology_v0.31.pdf .","key":"4_CR54_4"},{"unstructured":"Pfitzmann, A. (2008), Security in IT Networks: Multilateral Security in Distributed and by Distributed Systems, TU Dresden, Dresden. http:\/\/dud.inf.tu-dresden.de\/%7Epfitza\/SecCryptI_II.pdf","key":"4_CR55_4"},{"key":"4_CR56_4","first-page":"21","volume-title":"Multilateral Security in Communications, vol. 3: Technology, Infrastructure, Economy","author":"K. Rannenberg","year":"1999","unstructured":"Rannenberg, K., Pfitzmann, A., M\u00fcller, G. (1999), \u2018IT Security and Multilateral Security\u2019, in: M\u00fcller, G. and Rannenberg, K. (eds.): Multilateral Security in Communications, vol. 3: Technology, Infrastructure, Economy, Addison-Wesley, M\u00fcnchen, pp. 21\u201329."},{"unstructured":"Schneier, B. (1999), \u2018Attack Trees\u2019, Dr. Dobbs Journal. http:\/\/www.schneier.com\/paper-attacktrees-ddj-ft.html#rf7 .","key":"4_CR57_4"},{"unstructured":"Schreurs, W., Hildebrandt, M., Gasson, M., Warwick, K. (eds.) (2005), FIDIS Deliverable D7.3: Report on Actual and Possible Profiling Techniques in the Field of Ambient Intelligence, Download: http:\/\/www.fidis.net\/fileadmin\/fidis\/deliverables\/fidis-wp7-del7.3.ami_profiling.pdf .","key":"4_CR58_4"},{"key":"4_CR59_4","volume-title":"Computer Networks, forth edition","author":"A. S. Tanenbaum","year":"2003","unstructured":"Tanenbaum, A. S. (2003), Computer Networks, forth edition, Prentice Hall, Upper Saddle River, NJ."},{"unstructured":"Zhou, X., Kevenaar, T., Kelkboom, E., Busch, C., van der Veen, M., Nouak, A., (2007), \u2018Privacy Enhancing Technology for a 3D-Face Recognition System\u2019, BIOSIG 2007: Biometrics and Electronic Signatures, pp. 3\u201314. http:\/\/www.3dface.org\/files\/papers\/zhou-CAST2007-TemplateProtection.pdf","key":"4_CR60_4"}],"container-title":["The Future of Identity in the Information Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01820-6_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:21:35Z","timestamp":1606166495000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01820-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783540884804","9783642018206"],"references-count":60,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01820-6_4","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}