Policies and Research in Identity Management

First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007

ISBN: 978-0-387-77995-9 (Print) 978-0-387-77996-6 (Online)

Table of contents (12 chapters)

  1. Front Matter

    Pages i-x

  2. Analysis of Identification Schemes

    1. No Access

      Book Chapter

      Pages 3-4

      Keynote Paper: Politics and Identity Management

    2. No Access

      Book Chapter

      Pages 5-21

      Insecure Flight: Broken Boarding Passes and Ineffective Terrorist Watch Lists

  3. Privacy and Identity Management

    1. No Access

      Book Chapter

      Pages 25-37

      Context Based Enforcement of Authorization for Privacy and Security in Identity Management

    2. No Access

      Book Chapter

      Pages 39-48

      Automated Privacy Audits to Complement the Notion of Control for Identity Management

  4. Privacy Enhancing Technologies

    1. No Access

      Book Chapter

      Pages 51-53

      Keynote Paper: Privacy and trust in the Information Society

  5. Biometrics

    1. No Access

      Book Chapter

      Pages 57-77

      Keynote Paper: Biometric Encryption: Technology for Strong Authentication, Security and Privacy

    2. No Access

      Book Chapter

      Pages 79-90

      Investigating and Comparing Multimodal Biometric Techniques

    3. No Access

      Book Chapter

      Pages 91-102

      BASE: a Proposed Secure Biometric Authentication System

  6. Identity and Privacy Protection

    1. No Access

      Book Chapter

      Pages 105-120

      Keynote Paper: Are State-Mediated Forms of Identification a Reaction to Physical Mobility? The case of England, 1500-2007

    2. No Access

      Book Chapter

      Pages 121-138

      Privacy Risk Perceptions and Privacy Protection Strategies

    3. No Access

      Book Chapter

      Pages 139-146

      A Contextual Method for Evaluating Privacy Preferences

  7. Authentication

    1. No Access

      Book Chapter

      Pages 149-160

      Implementing Strong Authentication Interoperability with Legacy Systems