You are here: Resources > FIDIS Deliverables > HighTechID > D3.1: Overview on IMS > 

D3.1: Overview on IMS

Glossary  Title: Overview on IMS
REFERENCES
 Indices

 

References

 

[Ber00]Workshop on Freedom and Privacy by Design / Conference on Freedom and Privacy 2000, pp. 57-65, Toronto/Canada, April 2000.

[Buc99]FlexiPKI - Realisierung einer flexiblen Public-Key-Infrastruktur. Technischer Bericht der TU Darmstadt, December 1999.

[Cam01]Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In Advances in Cryptology – EUROCRYPT 2001, vol. 2045 of LNCS, pp. 93-118. Springer Verlag, 2001.

[Cam02]Proceedings of 9th ACM Conference on Computer and Communications Security. ACM Press, 2002.

[Cha81]Communications of the ACM, 24(2): pp. 84-88, Feb. 1981.

[Cha88]Advances in Cryptology — CRYPTO ‘88, vol. 403 of LNCS, pp. 319-327. Springer Verlag, 1990.

[Cla93]Proceedings of the Computers, Freedom & Privacy Conference, San Francisco, 1993.

[Cla01]Computer Networks, 37(2): pp. 205-219, October 2001.

[Cra02]    L. Cranor, M. Langheinrich, M. Massimo, M. Presler-Marshall, and J. Reagle. The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. http://www.w3.org/TR/P3P, April 2002.

[Dwo96]Proceedings of 28th Annual ACM Symposium on Theory of Computing (STOC), 1996.

[Fia86]Advances in Cryptology — CRYPTO ‘86, vol. 263 of LNCS, pp. 186-194. Springer Verlag, 1987.

[Ger01]Sicherheitskonzepte für das Internet, Kapitel 7, pp. 135-146. Springer-Verlag Berlin, Mai 2001.

[Ger03a]PIK Sonderheft Sicherheit 2003, 26(1): pp. 5-14, 2003

[Ger03b]Benutzbare Sicherheit für informationstechnische Systeme, Dissertation at Albert-Ludwigs-Universität Freiburg, 2003.

[Gol98] Advances in Cryptology ‑ CRYPTO ‘98, vol. 1642 of LNCS, pp. 153-168. Springer Verlag, 1998.

[ICP03]     ICPP (2003). Independent Centre for Privacy Protection (ICPP) Schleswig-Holstein and Studio Notarile Genghini (SNG); Identity Management Systems (IMS): Identification and Comparison; study prepared under contract for Institute for Prospective Technological Studies, Joint Research Centre Seville, Spain, Sept. 2003;    
http://www.datenschutzzentrum.de/idmanage/study/ICPP_SNG_IMS-Study.pdf

[Jen00] Proceedings of the 16th Annual Computer Security Applications Conference, pp. 344-353, December 2000.

[Jen01]Verlässliche IT-Systeme ‑ Sicherheit in komplexen Infrastrukturen, pp. 77-85. Vieweg, Wiesbaden, September 2001.

[Lys99] Proceedings of Selected Areas in Cryptography, vol. 1758 of LNCS. Springer Verlag, 1999.

[Pfi00] Secure and Anonymous Electronic Commerce: Providing Legal Certainty in Open Digital Systems Without Compromising Anonymity. Technical Report RZ 3232 (93278) 05/22/00, IBM Research Division, Zürich, Mai 2000.

[Ran97]Mehrseitige Sicherheit in der Kommunikationstechnik, pp. 21-29. Addison-Wesley Longman Verlag GmbH, 1997.

[Sch96]Grundlagen und Probleme der Betriebswirtschaft, pp. 492-494, Wirtschaftsverlage Bachem, 1996

[Sed01]Proceedings of the International Workshop “Innovative Internet Computing Systems”, Ilmenau, Juni 2001.

[Stu99] Unlinkable serial transactions: Protocols and applications. In ACM Transactions on Information and System Security, 2(4): pp. 354-389, Nov. 1999.

[Sun05] Sun Java™ System Access Manager 6. Technical Overview 2005Q1. Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054, U.S.A., Part No: 817-7643-10.

 

[Wol00]Computer Networks, 32: pp.685-699, 2000.

 

Glossary  fidis-wp3-del3.1.overview_on_IMS.final_04.sxw  Indices
28 / 31