Intra-Application Partitioning of Personal Data, Proceeding of the Workshop on Privacy-Enhanced Personalization (PEP'05) UC Irvine Institute for Software Research (ISR), pp.67-74, 2005. ,
Proactive security: Long-term protection against break-ins. RSA Laboratories' CryptoBytes, pp.1-8, 1997. ,
Security without identification: transaction systems to make big brother obsolete, Communications of the ACM, vol.28, issue.10, pp.1030-1044, 1985. ,
DOI : 10.1145/4372.4373
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.319.3690
Tackling the challenge of lifelong privacy, 2009. ,
PRIME -Ein europäisches Projekt für nutzerbestimmtes Identitätsmanagement. it -Information Technology, pp.352-359, 2005. ,
DOI : 10.1524/itit.2005.47.6.352
Identity management throughout one's whole life, Information Security Technical Report, vol.13, issue.2, pp.83-94, 2008. ,
DOI : 10.1016/j.istr.2008.06.003
Biometrics ? how to put to use and how not at all? In TrustBus '08, Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business, pp.1-7, 2008. ,
A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability , Pseudonymity, and Identity Management, 2009. ,
Privacy and Freedom, 1967. ,