Policies and Research in Identity Management First IFIP WG 11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications...

Full description

Bibliographic Details
Other Authors: de Leeuw, Elisabeth (Editor), Fischer-Hübner, Simone (Editor), Tseng, Jimmy C. (Editor), Borking, John (Editor)
Format: eBook
Language:English
Published: New York, NY Springer US 2008, 2008
Edition:1st ed. 2008
Series:IFIP Advances in Information and Communication Technology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Analysis of Identification Schemes
  • Keynote Paper: Politics and Identity Management
  • Insecure Flight: Broken Boarding Passes and Ineffective Terrorist Watch Lists
  • Privacy and Identity Management
  • Context Based Enforcement of Authorization for Privacy and Security in Identity Management
  • Automated Privacy Audits to Complement the Notion of Control for Identity Management
  • Privacy Enhancing Technologies
  • Keynote Paper: Privacy and trust in the Information Society
  • Biometrics
  • Keynote Paper: Biometric Encryption: Technology for Strong Authentication, Security and Privacy
  • Investigating and Comparing Multimodal Biometric Techniques
  • BASE: a Proposed Secure Biometric Authentication System
  • Identity and Privacy Protection
  • Keynote Paper: Are State-Mediated Forms of Identification a Reaction to Physical Mobility? The case of England, 1500-2007
  • Privacy Risk Perceptions and Privacy Protection Strategies
  • A Contextual Method for Evaluating Privacy Preferences
  • Authentication
  • Implementing Strong Authentication Interoperability with Legacy Systems