]. Borcea, H. Donker, E. Franz, K. Liesebach, H. Donker et al., Intra-Application Partitioning of Personal Data, Proceeding of the Workshop on Privacy-Enhanced Personalization (PEP'05) UC Irvine Institute for Software Research (ISR), pp.67-74, 2005.

[. Canetti, R. Gennaro, A. Herzberg, and D. Naor, Proactive security: Long-term protection against break-ins. RSA Laboratories' CryptoBytes, pp.1-8, 1997.

D. Chaum, Security without identification: transaction systems to make big brother obsolete, Communications of the ACM, vol.28, issue.10, pp.1030-1044, 1985.
DOI : 10.1145/4372.4373

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.319.3690

S. Clauß, M. Hansen, A. Pfitzmann, M. Raguse, and S. Steinbrecher, Tackling the challenge of lifelong privacy, 2009.

M. Hansen, K. Borcea-pfitzmann, and A. Pfitzmann, PRIME -Ein europäisches Projekt für nutzerbestimmtes Identitätsmanagement. it -Information Technology, pp.352-359, 2005.
DOI : 10.1524/itit.2005.47.6.352

M. Hansen, A. Pfitzmann, and S. Steinbrecher, Identity management throughout one's whole life, Information Security Technical Report, vol.13, issue.2, pp.83-94, 2008.
DOI : 10.1016/j.istr.2008.06.003

A. Pfitzmann, Biometrics ? how to put to use and how not at all? In TrustBus '08, Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business, pp.1-7, 2008.

A. Pfitzmann and M. Hansen, A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability , Pseudonymity, and Identity Management, 2009.

A. F. Westin, Privacy and Freedom, 1967.