{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:14:15Z","timestamp":1725538455387},"publisher-location":"Berlin, Heidelberg","reference-count":77,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540884804"},{"type":"electronic","value":"9783642018206"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01820-6_9","type":"book-chapter","created":{"date-parts":[[2009,9,18]],"date-time":"2009-09-18T16:02:59Z","timestamp":1253289779000},"page":"351-390","source":"Crossref","is-referenced-by-count":2,"title":["Privacy and Identity"],"prefix":"10.1007","author":[{"given":"Maike","family":"Gilliot","sequence":"first","affiliation":[]},{"given":"Vashek","family":"Matyas","sequence":"additional","affiliation":[]},{"given":"Sven","family":"Wohlgemuth","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"9_CR1_9","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1145\/76894.76895","volume":"21","author":"N. R. Adam","year":"1989","unstructured":"Adam, N. R. and Worthmann, C. J. (1989), \u2018Security-control methods for statistical databases: a coparative study\u2019, ACM Computing Surveys, 21 (4), pp. 515\u2013556.","journal-title":"ACM Computing Surveys"},{"key":"9_CR2_9","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-0-387-77996-6_4","volume":"261","author":"R. Accorsi","year":"2008","unstructured":"Accorsi, R. (2008), \u2018Automated Privacy Audits to Complement the Notion of Control for Identity Management\u2019, Policies and Research in Identity Management, IFIP vol. 261, pp. 39\u201348.","journal-title":"Policies and Research in Identity Management, IFIP"},{"key":"9_CR3_9","unstructured":"Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter, M. (2003), \u2018Enterprise Privacy Authorization Language (EPAL)\u2019, IBM Research, url: http:\/\/www.zurich.ibm.com\/ security\/enterprise-privacy\/epal\/specification ."},{"key":"9_CR4_9","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/3-540-48749-2_9","volume":"1603","author":"T. Aura","year":"1999","unstructured":"Aura, T. (1999), \u2018Distributed Access-Rights Managements with Delegations Certificates\u2019, Secure internet Programming: Security Issues For Mobile and Distributed Objects, LNCS vol. 1603, pp. 211\u2013235.","journal-title":"Secure internet Programming: Security Issues For Mobile and Distributed Objects, LNCS"},{"key":"9_CR5_9","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/3-540-44934-5_5","volume-title":"Revised Papers From the international Workshop on Web Usage Analysis and User Profiling LNCS","author":"M. Baumgarten","year":"1999","unstructured":"Baumgarten, M., Buechner, A. G., Anand, S. S., Mulvenna, M. D., Hughes, J. G. (1999), \u2018User-driven navigation pattern discovery from internet data\u2019, in: Masand, B.M. and Spiliopoulou, M. (eds.), Revised Papers From the international Workshop on Web Usage Analysis and User Profiling LNCS Vol. 1836. pp. 74\u201391, SpringerWeb Usage Analysis and User Profiling, Proceedings of International WEBKDD'99 Workshop San Diego, CA, USA, LNCS vol. 1836."},{"issue":"3","key":"9_CR6_9","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1145\/320613.320617","volume":"5","author":"L. L. Beck","year":"1980","unstructured":"Beck, L. L. (1980), \u2018A security mechanism for statistical database\u2019, ACM Transactions on Database Systems (TODS) 5 (3), pp. 316\u2013338.","journal-title":"ACM Transactions on Database Systems (TODS)"},{"issue":"1","key":"9_CR7_9","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s00145-002-0128-6","volume":"16","author":"A. Beimel","year":"2003","unstructured":"Beimel, A. and Dolev, S. (2003), \u2018Buses for anonymous message delivery\u2019, Journal of Cryptology, 16 (1), pp. 25\u201339.","journal-title":"Journal of Cryptology"},{"key":"9_CR8_9","doi-asserted-by":"crossref","unstructured":"Bennett, K. and Grothoff, C. (2003), \u2018GAP \u2014 Practical Anonymous Networking\u2019, Proceedings of the Privacy Enhancing Technologies Workshop (PET \u201803), pp. 141\u2013160.","DOI":"10.1007\/978-3-540-40956-4_10"},{"key":"9_CR9_9","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A. D. (1998), \u2018The role of trust management in distributed systems security\u2019, Secure Internet Programming, Issues in Distributed and Mobile Object Systems, LNCS State-of-the-Art series, Springer.","DOI":"10.1007\/3-540-48749-2_8"},{"key":"9_CR10_9","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/3-540-44934-5_6","volume":"1836","author":"J. Borges","year":"2000","unstructured":"Borges, J. and Levene, M. (2000), \u2018Data mining of user navigation patterns\u2019, Revised Papers from the International Workshop on Web Usage Analysis and User Profiling, LNCS vol. 1836, pp. 92\u2013111,.","journal-title":"Revised Papers from the International Workshop on Web Usage Analysis and User Profiling, LNCS"},{"key":"9_CR11_9","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/3-540-44934-5_4","volume":"1836","author":"A. J. Broder","year":"1999","unstructured":"Broder, A. J. (1999), \u2018Data mining, the internet, and privacy\u2019, Revised Papers from the International Workshop on Web Usage Analysis and User Profiling, LNCS vol. 1836, pp. 56\u201373.","journal-title":"Revised Papers from the International Workshop on Web Usage Analysis and User Profiling, LNCS"},{"key":"9_CR12_9","unstructured":"Buitelaar, H. (ed.) (2007), FIDIS Deliverable D13.3: Study on ID number policies, Download: www.fidis.net\/resources\/deliverables\/."},{"key":"9_CR13_9","unstructured":"Bygrave, L. A. (2002), \u2018Data Protection Law, Approaching its rationale, logic and limits\u2019, Kluwer Law International, pp. 94\u201395."},{"key":"9_CR14_9","doi-asserted-by":"crossref","unstructured":"Camenisch, J. and van Herreweghen, E. (2002), \u2018Design and Implementation of the idemix Anonymous Credential System\u2019, Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 21\u201330.","DOI":"10.1145\/586110.586114"},{"key":"9_CR15_9","first-page":"93","volume":"2045","author":"J. Camenisch","year":"2001","unstructured":"Camenisch, J. and Lysyanskaya, A. (2001), \u2018An efficient system for non-transferable anonymous credentials with optional anonymity revocation\u2019 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT \u201801), LNCS vol. 2045, pp. 93\u2013118.","journal-title":"Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT \u201801), LNCS"},{"key":"9_CR16_9","first-page":"274","volume":"2576","author":"J. Camenisch","year":"2002","unstructured":"Camenisch, J. and Lysyanskaya, A. (2002), \u2018A signature scheme for efficient protocols\u2019, Proceedings of Third Conference on Security in Communication Networks, LNCS vol. 2576, pp. 274\u2013295.","journal-title":"LNCS"},{"key":"9_CR17_9","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Shelat, A., Sommer, D., Fischer-H\u0171bner, S., Hansen, M., Krasemann, H., Lacoste, G., Leenes, R., Tseng, J. (2005), \u2018Privacy and identity management for everyone\u2019 Proceedings of the 2005 workshop on Digital identity management (DIM \u201805), pp. 20\u201327.","DOI":"10.1145\/1102486.1102491"},{"key":"9_CR18_9","doi-asserted-by":"crossref","unstructured":"Casassa Mont, M., Pearson, S., Bramhall, P. (2003), \u2018Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services\u2019, Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), pp. 377\u2013382.","DOI":"10.1109\/DEXA.2003.1232051"},{"key":"9_CR19_9","doi-asserted-by":"crossref","unstructured":"Casassa Mont, M. and Pearson, S. (2005), \u2018An Adaptive Privacy Management System for Data Repositories\u2019, in: Kazikas, S., Lopez, J., Pernul, G. (eds.) Proceedings of TrustBus 2005, LNCS vol. 3592, Springer, pp. 236\u2013245.","DOI":"10.1007\/11537878_24"},{"issue":"2","key":"9_CR20_9","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"4","author":"D. Chaum","year":"1981","unstructured":"Chaum, D. (1981), \u2018Untraceable electronic mail, return addresses, and digital pseudonyms\u2019, Communications of the ACM 4 (2), pp. 84\u201388.","journal-title":"Communications of the ACM"},{"key":"9_CR21_9","first-page":"241","volume":"281","author":"D. Chaum","year":"1986","unstructured":"Chaum, D. (1986), \u2018Showing credentials without identification. Signatures transferred between unconditionally unlinkable pseudonyms\u2019, Proceedings of the workshop on Theory and Application of Cryptographic Techniques (EUROCRYPT \u201885), LNCS vol. 281, pp. 241\u2013244.","journal-title":"LNCS"},{"issue":"1","key":"9_CR22_9","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1","author":"D. Chaum","year":"1988","unstructured":"Chaum, D. (1988), \u2018The dining cryptographers problem: Unconditional sender and recipient untraceability\u2019, Journal of Cryptology 1 (1), pp. 65\u201375.","journal-title":"Journal of Cryptology"},{"key":"9_CR23_9","doi-asserted-by":"crossref","unstructured":"Chawla, S., Dwork, C., McSherry, F., Smith, A., Wee, H. (2005), \u2018Toward privacy in public databases\u2019, in: Kilian, J. (ed.) Proceedings of the 2nd Theory of Cryptography Conference (TCC'05), LNCS vol. 3378, Springer, pp. 363\u2013385.","DOI":"10.1007\/978-3-540-30576-7_20"},{"issue":"6","key":"9_CR24_9","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1109\/TSE.1982.236161","volume":"8","author":"F. Y. L. Chin","year":"1982","unstructured":"Chin, F. Y. L. and \u00d6zsoyoglu, G. (1982), \u2018Auditing and inference control in statistical databases\u2019, IEEE Transactions on Software Engineering (TSE) 8 (6), pp. 574\u2013582.","journal-title":"IEEE Transactions on Software Engineering (TSE)"},{"issue":"6","key":"9_CR25_9","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1145\/293347.293350","volume":"45","author":"B. Chor","year":"1998","unstructured":"Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M. (1998), Private information retrieval', Journal of ACM 45 (6), pp. 965\u2013981.","journal-title":"Journal of ACM"},{"issue":"2","key":"9_CR26_9","first-page":"205","volume":"37","author":"S. Clau\u00df","year":"2001","unstructured":"Clau\u00df, S. and K\u00f6hntopp, M. (2001), \u2018Identity management and its support of multilateral security\u2019, Computer Networks, The International Journal of Computer and Telecommunications Networking 37 (2), pp. 205\u2013219.","journal-title":"Computer Networks, The International Journal of Computer and Telecommunications Networking"},{"key":"9_CR27_9","first-page":"15","volume-title":"Proceedings of the ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery","author":"C. Clifton","year":"1996","unstructured":"Clifton, C. and Marks, D. (1996), \u2018Security and privacy implications of data mining\u2019, Proceedings of the ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery, Montreal, Canada, pp. 15\u201319."},{"key":"9_CR28_9","unstructured":"College bescherming persoonsgegevens (2002), \u2018Electronische overheid en privacy, Bescherming van persoonsgegevens in de informatiestructuur van de overheid [Electronic Government and privacy, Data protection in the government information structure]\u2019, Den Haag."},{"key":"9_CR29_9","unstructured":"Common Criteria Editorial Board (2007), \u2018Common Criteria for Information Technology Security Evaluation (Part 2: Security functional requirements)\u2019, Version 3.1, rev. 2."},{"key":"9_CR30_9","doi-asserted-by":"crossref","unstructured":"Cox, I. J., Miller, M. L., Bloom, J. A., Fridrich, J., Kalker, T. (2008), Digital Watermarking and Steganography, Morgan Kaufmann.","DOI":"10.1016\/B978-012372585-1.50015-2"},{"key":"9_CR31_9","unstructured":"De Bot, D. (2005), \u2018Privacybescherming bij e-government in Belgi\u00e9. Een kritische analyse van het Rijksregister, de Kruispuntbank van Ondernemingen en de elektronische identiteitskaart, [Privacy protection in e-government in Belgium. A critical analysis of the Rijksregister, the Crossroads bank of enterprises and the electronic identity card]\u2019, p. 56, Vandenbroeke, Brugge."},{"issue":"1","key":"9_CR32_9","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/320064.320069","volume":"4","author":"D. E. Denning","year":"1979","unstructured":"Denning, D. E. and Denning, P. J. (1979), \u2018The tracker: a threat to statistical database security\u2019, ACM Transactions on Database Systems (TODS) 4 (1), pp. 76\u201396.","journal-title":"ACM Transactions on Database Systems (TODS)"},{"issue":"3","key":"9_CR33_9","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1145\/320613.320616","volume":"5","author":"D. E. Denning","year":"1980","unstructured":"Denning, D. E. (1980), \u2018Secure statistical databases with random sample queries\u2019, ACM Transactions on Database Systems (TODS) 5 (3), pp. 291\u2013315.","journal-title":"ACM Transactions on Database Systems (TODS)"},{"issue":"1","key":"9_CR34_9","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1145\/320064.320068","volume":"4","author":"D. Dobkin","year":"1979","unstructured":"Dobkin, D., Jones, A. K., Lipton, R. J. (1979), \u2018Secure databases: protection against user influence\u2019, ACM Transactions on Database Systems (TODS 4 (1), pp. 97\u2013106.","journal-title":"ACM Transactions on Database Systems (TODS"},{"key":"9_CR35_9","doi-asserted-by":"crossref","unstructured":"Dua, S., Iyengar, S. S., Cho, E. (2000), \u2018Discovery of web frequent patterns and user characteristics from web access logs: A framework for dynamic web personalization\u2019, Proceedings of the 3rd IEEE Symposium on Application-Specific Systems and Software Engineering Technology (ASSET'00).","DOI":"10.1109\/ASSET.2000.888025"},{"key":"9_CR36_9","first-page":"31","volume":"L 281","author":"The European Parliament and the Council","year":"1995","unstructured":"The European Parliament and the Council (1995), \u2018Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data on the free movement of such data\u2019, Official Journal of the European Communities, L 281, Brussels, pp. 31\u201350.","journal-title":"Official Journal of the European Communities"},{"key":"9_CR37_9","unstructured":"The European Parliament, the Council and the Commission (2000), \u2018The Charter of Fundamental Rights of the European Union (2000\/C 364)\u2019, Official Journal of the European Communities. http:\/\/www.europarl.europa.eu\/charter\/pdf\/text_en.pdf."},{"key":"9_CR38_9","volume-title":"Secure Electronic Commerce","author":"W. Ford","year":"1997","unstructured":"Ford, W. and Baum, M. S. (1997), \u2018Secure Electronic Commerce\u2019, Prentice-Hall, Inc., New Jersey."},{"key":"9_CR39_9","unstructured":"Grothoff, C., Patrascu, I., Bennett, K., Stef, T., Horozov, T. (2002), \u2018GNET\u2019, Whitepaper, Version 0.5.2. http:\/\/www.gnunet.org\/download\/main.pdf."},{"key":"9_CR40_9","unstructured":"Gutwirth, S., and de Hert, P. (2005), \u2018Privacy and Data Protection in a Democratic Constitutional State\u2019, Profiling: Implications for Democracy and Rule of Law, in: Hildebrandt, M., Gutwirth, S., De Hert, P. (eds.), FIDIS Deliverable D7.4: Implications of profiling practice on democracy, Download: www.fidis.net\/resources\/deliverables\/ , pp. 11\u201328."},{"key":"9_CR41_9","unstructured":"Hansen, M. and Krasemann, H. (2005), \u2018Prime White Paper\u2019, White Paper, Privacy and Identity Management for Europe, PRIME."},{"issue":"8","key":"9_CR42_9","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"M.A. Harrison","year":"1979","unstructured":"Harrison, M.A., Ruzzo, W.L., Ullman, D.J. (1979), \u2018Protection in Operating Systems\u2019, Communications of ACM 19, (8), pp. 461\u2013471.","journal-title":"Communications of ACM"},{"key":"9_CR43_9","first-page":"143","volume-title":"Proceedings of the Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), CRPIT","author":"A. Josang","year":"2007","unstructured":"Josang, A., Al Zomai, M., Suriadi, S. (2007), \u2018Usability and privacy in identity management architectures\u2019, in: Brankovic, L. and Steketee, C. (eds.), Proceedings of the Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), CRPIT Vol. 68, Ballarat, Australia, pp. 143\u2013152."},{"key":"9_CR44_9","doi-asserted-by":"crossref","unstructured":"Kang, S.-I. and Lee, I.-Y. (2005), \u2018A study on the e-cash system with anonymity and divisibility\u2019, in: Gervasi, O., Gavrilova, M. L., Kumar, V., Lagan\u00e0, A., Lee, H. P., Mun, Y., Taniar, D., Tan, C. J. K. (eds.), \u2018Computational Science and Its Applications \u2014 IC-CSA 2005\u2019, Proceedings of the International Conference on Computational Science and its Applications (ICCSA \u201805), Part II, LNCS Vol. 3481, Springer, pp. 177\u2013186.","DOI":"10.1007\/11424826_19"},{"key":"9_CR45_9","doi-asserted-by":"crossref","unstructured":"Kargupta, H., Datta, S., Wang, Y., Sivakumar, K. (2003), \u2018On the privacy preserving properties of random data perturbation techniques\u2019, Proceedings of the third IEEE International Conference on Data Mining (ICDM'03), pp. 99\u2013106.","DOI":"10.1109\/ICDM.2003.1250908"},{"key":"9_CR46_9","first-page":"69","volume":"2482","author":"G. Karjoth","year":"2003","unstructured":"Karjoth, G., Schunter, M., Waidner, M. (2003), \u2018Platform for Enterprise Privacy Practices: Privacy-enabled Management of Customer Data\u2019, Proceedings of the 2nd Workshop on Privacy Enhancing Technologies (PET 2002), LNCS vol. 2482, pp.69\u201384.","journal-title":"LNCS"},{"key":"9_CR47_9","doi-asserted-by":"crossref","unstructured":"Kleinberg, J. M., Papadimitriou, C. H., Raghavan, P. (2000), \u2018Auditing boolean attributes\u2019, Proceedings of the nineteenth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of database systems, pp.86\u201391.","DOI":"10.1145\/335168.335210"},{"issue":"32","key":"9_CR48_9","first-page":"1555","volume":"32","author":"B.-J. Koops","year":"2001","unstructured":"Koops, B.-J. (2001), \u2018Een nieuwe GBA, digitale kluisjes en identificatiedrang [A new GBA, digital vaults and the identification urge]\u2019, NJB 32 (32), pp. 1555\u20131561.","journal-title":"NJB"},{"key":"9_CR49_9","unstructured":"Koops, B.-J., Buitelaar, H., Lips, M. (eds.) (2007), FIDIS Deliverable D5.4: Anonymity in electronic government: a case-study analysis of governments\u2019 identity knowledge, Download: www.fidis.net\/resources\/deliverables\/ ."},{"key":"9_CR50_9","unstructured":"Malin, B. (2002), \u2018Compromising privacy with trail re-identification: The reidit algorithms\u2019, Technical Report CMU-CALD-02-108, Carnegie Mellon University."},{"key":"9_CR51_9","doi-asserted-by":"crossref","unstructured":"Matloff, N. S. (1986), \u2018Another look at the use of noise addition for database security\u2019, IEEE Symposium on Security and Privacy, pp. 173\u2013181, IEEE Computer Society.","DOI":"10.1109\/SP.1986.10014"},{"key":"9_CR52_9","unstructured":"Maty\u00e1\u0161, V. and Cvr\u010dek, D. (2004), \u2018On the Role of Contextual Information for Privacy Attacks and Classification\u2019, Proceedings of the Privacy and Security Aspects of Data Mining Workshop, pp. 31\u201339."},{"key":"9_CR53_9","unstructured":"M\u00fcller, G. and Wohlgemuth, S. (eds.) (2007), FIDIS Deliverable D14.2 Study on Privacy in Business Processes by Identity Management, Download: www.fidis.net\/resources\/de-liverables\/ ."},{"key":"9_CR54_9","doi-asserted-by":"crossref","unstructured":"Neuman, B. C. (1993), \u2018Proxy-Based Authorization and Accounting for Distributed Systems\u2019, Proceedings of the 13th International Conference on Distributed Computing Systems, pp. 283\u2013291.","DOI":"10.1109\/ICDCS.1993.287698"},{"key":"9_CR55_9","first-page":"101","volume":"79","author":"H. Nissenbaum","year":"2004","unstructured":"Nissenbaum, H. (2004), \u2018Privacy as Contextual Integrity\u2019, Washington Law Review 79, pp. 101\u2013140.","journal-title":"Washington Law Review"},{"issue":"1","key":"9_CR56_9","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/984334.984339","volume":"7","author":"J. Park","year":"2004","unstructured":"Park, J. and Sandhu, R. (2004), \u2018The UCONABC usage control model\u2019, ACM Transaction on Information System Security 7 (1), pp. 128\u2013174.","journal-title":"ACM Transaction on Information System Security"},{"key":"9_CR57_9","unstructured":"Pfitzmann, A. and Hansen, M. (2009), \u2018Anonymity, unobservability, and pseudonymity: A proposal for terminology\u2019, in: Federrath, H. (ed.), Designing Privacy Enhancing Technologies (PET'00), LNCS vol. 2009, Springer, pp. 1\u20139."},{"issue":"9","key":"9_CR58_9","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/1151030.1151053","volume":"49","author":"A. Pretschner","year":"2006","unstructured":"Pretschner, A., Hilty, M., Basin (2006), \u2018Distributed Usage Control\u2019, Communications of the ACM 49 (9), pp 39\u201344.","journal-title":"Communications of the ACM"},{"key":"9_CR59_9","doi-asserted-by":"crossref","unstructured":"Pretschner, A., Hilty, M., Basin, D., Schaefer, C., Walter, T. (2008), \u2018Mechanisms for Usage Control\u2019, Proceedings of the ACM Symposium on Information, Computer & Communication Security (ASIACCS \u201808), pp. 240\u2013245.","DOI":"10.1145\/1368310.1368344"},{"key":"9_CR60_9","first-page":"13","volume":"91","author":"C. Prins","year":"2003","unstructured":"Prins, C. and de Vries, M. (2003), \u2018ID or not to be? Naar een doordacht stelsel voor digitale identificatie [ID or not to be? Towards a well thought out system for digital identification]\u2019, Rathenau Instituut, Working document 91, p. 13.","journal-title":"Rathenau Instituut, Working document"},{"key":"9_CR61_9","first-page":"177","volume":"2433","author":"W. Qiu","year":"2002","unstructured":"Qiu, W., Chen, K., Gu, D. (2002), \u2018A new offline privacy protecting e-cash system with revokable anonymity\u2019, Proceedings of the 5th International Conference on Information Security, LNCS vol. 2433, pp. 177\u2013190.","journal-title":"LNCS"},{"issue":"1","key":"9_CR62_9","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"M. Reiter","year":"1998","unstructured":"Reiter, M. and Rubin, A. (1998), \u2018Crowds: Anonymity for web transactions\u2019, ACM Transactions on Information and System Security (TISSEC) 1 (1), pp. 66\u201392.","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"9_CR63_9","unstructured":"Rivest, R., Adelman, L., Dertouzos, M. (1978), \u2018On databanks and privacy homomorph-ism\u2019, Foundations of secure computation, pp. 168\u2013177."},{"key":"9_CR64_9","doi-asserted-by":"crossref","unstructured":"Sackmann, S., Str\u00fcker, J., Accorsi, R. (2006), \u2018Personalization in Privacy-Aware Highly Dynamic Systems\u2019, Communications of the ACM 49 (9).","DOI":"10.1145\/1151030.1151052"},{"key":"9_CR65_9","unstructured":"Samarati, P. and Sweeney, L. (1998), \u2018Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression\u2019, Technical Report SRI-CSL-98-04, SRI Computer Science Laboratory,."},{"issue":"3","key":"9_CR66_9","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1093\/comjnl\/26.3.218","volume":"26","author":"J. Schl\u00f6rer","year":"1983","unstructured":"Schl\u00f6rer, J. (1983), \u2018Information loss in partitioned statistical databases\u2019, Computer Journal 26 (3), pp. 218\u2013223.","journal-title":"Computer Journal"},{"issue":"3","key":"9_CR67_9","doi-asserted-by":"publisher","first-page":"477","DOI":"10.2307\/40041279","volume":"154","author":"D. Solove","year":"2006","unstructured":"Solove, D. (2006), \u2018A taxonomy of privacy\u2019, University of Pennsylvania Law Review 154 (3), pp. 477\u2013560.","journal-title":"University of Pennsylvania Law Review"},{"issue":"5","key":"9_CR68_9","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L. (2002), \u2018k-anonymity: a model for protecting privacy\u2019, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10 (5), pp. 557\u2013570.","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"9_CR69_9","volume-title":"Information privacy, data mining, and the internet","author":"H. T. Tavani","year":"1999","unstructured":"Tavani, H. T. (1999), \u2018Information privacy, data mining, and the internet\u2019, Ethics and Information Technology, Kluwer Academic Publishers, Hingham, MA, USA."},{"key":"9_CR70_9","unstructured":"The Common Criteria Project Sponsoring Organisations (1999), Common Criteria for Information Technology Security Evaluation \u2014 part 2, Version 2.1."},{"issue":"2","key":"9_CR71_9","doi-asserted-by":"crossref","first-page":"14","DOI":"10.4018\/jdm.2003040102","volume":"14","author":"R. L. Wilson","year":"2003","unstructured":"Wilson, R. L. and Rosen, P. A. (2003), \u2018Protecting data through perturbation techniques: The impact on knowledge discovery in databases\u2019 Journal of Database Management 14 (2), pp. 14\u201326.","journal-title":"Journal of Database Management"},{"key":"9_CR72_9","doi-asserted-by":"crossref","unstructured":"Wishart, R., Henricksen, K., Indulska, J. (2005), \u2018Context Obfuscation for Privacy via Ontological Descriptions\u2019, in: Strang, T. and Linnhoff-Popien, C. (eds.), Location- and Context-Awareness: First International Workshop (LoCA 2005), Oberpfaffenhofen, Germany, LNCS vol. 3479. Springer.","DOI":"10.1007\/11426646_26"},{"key":"9_CR73_9","doi-asserted-by":"crossref","unstructured":"Wohlgemuth, S. and M\u00fcller, G. (2006), \u2018Privacy with Delegation of Rights by Identity Management\u2019, Proceedings of International Conference on Emerging Trends in Information and Communication Security (ETRICS 2006), Freiburg, Germany, 2006, LNCS vol. 2995, Springer, pp. 175\u2013190.","DOI":"10.1007\/11766155_13"},{"key":"9_CR74_9","volume-title":"Privatsph\u00e4re durch die Delegation von Rechten","author":"S. Wohlgemuth","year":"2008","unstructured":"Wohlgemuth, S. (2008), \u2018Privatsph\u00e4re durch die Delegation von Rechten\u2019, Ph.D. thesis at the University of Freiburg, Germany."},{"key":"9_CR75_9","unstructured":"Wohlgemuth, S., Jendricke, U., Gerd tom Markotten, D., Dorner, F., M\u00fcller, G. (2004), Sicherheit und Benutzbarkeit durch Identit\u00e4tsmanagement\u2019, in: Spath, D., Haases, K. (eds.) Tagungsband zum doIT Software-Forschungstag 2003: Aktuelle Trends in der Softwareforschung, IRB Verlag Stuttgart, pp. 241\u2013260."},{"key":"9_CR76_9","volume-title":"Anonymity for Users of Mobile Devices through Location Addressing","author":"A. Zugenmaier","year":"2003","unstructured":"Zugenmaier, A. (2003), \u2018Anonymity for Users of Mobile Devices through Location Addressing\u2019, RHOMBOS-Verlag, Berlin."},{"key":"9_CR77_9","unstructured":"Zugenmaier, A., Kreutzer, M., M\u00fcller, G. (2003), \u2018The Freiburg Privacy Diamond: An attacker model for a mobile computing environment\u2019, Proceedings of Kommunikation in Verteilten Systemen (KiVS) \u201803."}],"container-title":["The Future of Identity in the Information Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01820-6_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:21:36Z","timestamp":1606184496000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01820-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783540884804","9783642018206"],"references-count":77,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01820-6_9","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}