A. Hoikkanen, M. Bacigalupo, Wainer Lusoli, I. Maghiros, S. G. Nikolov
{"title":"Understanding the Economics of Electronic Identity: Theoretical Approaches and Case Studies","authors":"A. Hoikkanen, M. Bacigalupo, Wainer Lusoli, I. Maghiros, S. G. Nikolov","doi":"10.1007/978-3-642-17303-5_4","DOIUrl":"https://doi.org/10.1007/978-3-642-17303-5_4","url":null,"abstract":"","PeriodicalId":188160,"journal":{"name":"IFIP Conference on Policies and Research in Identity Management","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116261890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Profitable Investments Mitigating Privacy Risks","authors":"J. Borking","doi":"10.1007/978-3-642-17303-5_5","DOIUrl":"https://doi.org/10.1007/978-3-642-17303-5_5","url":null,"abstract":"","PeriodicalId":188160,"journal":{"name":"IFIP Conference on Policies and Research in Identity Management","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127862961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing Strong Authentication Interoperability with Legacy Systems","authors":"Jan Zibuschka, Heiko Rossnagel","doi":"10.1007/978-0-387-77996-6_12","DOIUrl":"https://doi.org/10.1007/978-0-387-77996-6_12","url":null,"abstract":"","PeriodicalId":188160,"journal":{"name":"IFIP Conference on Policies and Research in Identity Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129187773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Contextual Method for Evaluating Privacy Preferences","authors":"Caroline Sheedy, P. Kumaraguru","doi":"10.1007/978-0-387-77996-6_11","DOIUrl":"https://doi.org/10.1007/978-0-387-77996-6_11","url":null,"abstract":"","PeriodicalId":188160,"journal":{"name":"IFIP Conference on Policies and Research in Identity Management","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123904491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Keynote Paper: Privacy and trust in the Information Society","authors":"D. V. Rooy","doi":"10.1007/978-0-387-77996-6_5","DOIUrl":"https://doi.org/10.1007/978-0-387-77996-6_5","url":null,"abstract":"","PeriodicalId":188160,"journal":{"name":"IFIP Conference on Policies and Research in Identity Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131068858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigating and Comparing Multimodal Biometric Techniques","authors":"Christopher Andrade, S. V. Solms","doi":"10.1007/978-0-387-77996-6_7","DOIUrl":"https://doi.org/10.1007/978-0-387-77996-6_7","url":null,"abstract":"","PeriodicalId":188160,"journal":{"name":"IFIP Conference on Policies and Research in Identity Management","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132879499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy Risk Perceptions and Privacy Protection Strategies","authors":"I. Oomen, R. Leenes","doi":"10.1007/978-0-387-77996-6_10","DOIUrl":"https://doi.org/10.1007/978-0-387-77996-6_10","url":null,"abstract":"","PeriodicalId":188160,"journal":{"name":"IFIP Conference on Policies and Research in Identity Management","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126879503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context Based Enforcement of Authorization for Privacy and Security in Identity Management","authors":"V. Alagar, Kaiyu Wan","doi":"10.1007/978-0-387-77996-6_3","DOIUrl":"https://doi.org/10.1007/978-0-387-77996-6_3","url":null,"abstract":"","PeriodicalId":188160,"journal":{"name":"IFIP Conference on Policies and Research in Identity Management","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123766902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Simone Fischer Hübner, E. D. Leeuw, Lothar Fritsch
{"title":"Policies and Research in Identity Management - Second IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19, 2010. Proceedings","authors":"Simone Fischer Hübner, E. D. Leeuw, Lothar Fritsch","doi":"10.1007/978-3-642-17303-5","DOIUrl":"https://doi.org/10.1007/978-3-642-17303-5","url":null,"abstract":"","PeriodicalId":188160,"journal":{"name":"IFIP Conference on Policies and Research in Identity Management","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121893293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Keynote Paper: Politics and Identity Management","authors":"Gus Hosein","doi":"10.1007/978-0-387-77996-6_1","DOIUrl":"https://doi.org/10.1007/978-0-387-77996-6_1","url":null,"abstract":"","PeriodicalId":188160,"journal":{"name":"IFIP Conference on Policies and Research in Identity Management","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114979513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}