Difference between revisions of "References"
Line 24: | Line 24: | ||
== Legal/ Philosophical Papers == | == Legal/ Philosophical Papers == | ||
+ | |||
+ | |||
+ | [http://www.harvardlawreview.org/symposium/papers2012/cohen.pdf Julie Cohen, WHAT PRIVACY IS FOR] | ||
C. Freid: Privacy. Yale Law Journal 77(3): 475-493 (1968). <br> | C. Freid: Privacy. Yale Law Journal 77(3): 475-493 (1968). <br> | ||
Line 31: | Line 34: | ||
H. Nissenbaum, "Privacy as Contextual Integrity", Washington Law Review (79) 1, February 2004, pp. 119-158. | H. Nissenbaum, "Privacy as Contextual Integrity", Washington Law Review (79) 1, February 2004, pp. 119-158. | ||
− | D. Solove: "I've got nothing to hide" and other misunderstandings of privacy, 44 San Diego Law Review 745 (2007). <br> | + | D. Solove: "I've got nothing to hide" and other misunderstandings of privacy, 44 San Diego Law Review 745 (2007). (See also [http://www.aclu.org/blog/technology-and-liberty-national-security/plenty-hide this ACLU blogpost]<br> |
Warren and Brandeis: The Right to Privacy Harvard Law Review. IV(5), December 15, 1890. <br> | Warren and Brandeis: The Right to Privacy Harvard Law Review. IV(5), December 15, 1890. <br> |
Revision as of 11:59, 7 January 2013
Books
(In reverse chronological order)
J. Jarvis "Public Parts. How sharing in the digital age improves the way we work and live", Simon & Schuster, 2011.
- Jarvis argues the benefits of sharing personal information: a valuable resource that portrays the other side of the coin.
D. Solove "Understanding Privacy", Harvard University Press, 2010.
Bart de Koning "Alles onder controle", Uitgeverij Balans, 2008.
P. E. Agre and M. Rotenberg (eds.) "Technology and privacy: The new landscape", MIT Press, Cambridge, MA, 2001.
A. Westin "Privacy and Freedom", Atheneum, New York, 1976.
I. Trojanov and J. Zeh "Aanslag op de vrijheid", De Geus, Breda, 2010. (Original German title "Angriff auf die Freiheit: Sicherheitswahn, Ueberwachungsstaat und der Abbau buergerliche Rechte").
Arnoud Engelfriet De wet op internet 2010
Overviews
Jaap-Henk Hoepman, Marc v. Lieshout "Privacy: an overview", draft, February 2011.
Legal/ Philosophical Papers
Julie Cohen, WHAT PRIVACY IS FOR
C. Freid: Privacy. Yale Law Journal 77(3): 475-493 (1968).
H. Nissenbaum: "Towards an approach to privacy in public: The challenges of information technology", Ethics and Behaviour (7), 1997, pp. 207-219.
H. Nissenbaum, "Privacy as Contextual Integrity", Washington Law Review (79) 1, February 2004, pp. 119-158.
D. Solove: "I've got nothing to hide" and other misunderstandings of privacy, 44 San Diego Law Review 745 (2007). (See also this ACLU blogpost
Warren and Brandeis: The Right to Privacy Harvard Law Review. IV(5), December 15, 1890.
Technical papers
Basic techniques
David Chaum: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 4(2): 84-88 (1981).
David Chaum: Security Without Identification: Transaction Systems to Make Big Brother Obsolete. Commun. ACM 28(10): 1030-1044 (1985).
Ian Goldberg, David Wagner, and Eric Brewer: Privacy-enhancing Technologies for the Internet. Proc. 42nd IEEE Spring COMPCON (1997).
Ian Goldberg: Privacy-enhancing technologies for the Internet, II: Five years later. Proc. Privacy Enhancing Technologies workshop (PET 2002).
Mixnets
Golle, P., Jakobsson, M., Juels, A., and Syverson, P. F. Universal reencryption for mixnets. In RSA Conf. (San Fransisco, CA, USA, Feb. 23-27 2004), LNCS 2964, pp. 163-178.
RFID and Pervasive systems
Garfinkel, S. L., Juels, A., and Pappu, R. RFID privacy: An overview of problems and proposed solutions. IEEE Security & Privacy (May 2005), 34-43.
Juels, A. RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications 24, 2 (2006), 381-394.
Sarma, S. E., Weis, S. A., and Engels, D. W. Rfid systems, security & privacy implications (white paper). Tech. Rep. MIT-AUTOID-WH-014, Auto-ID Center, MIT, Cambridge, MA, USA, 2002.
Gildas Avoine: A bibliography of RFID
Identity management and credential systems
Camenisch, Lysyanskaya: "An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation", EUROCRYPT 2001: 93-118
Stefan Brands: "Rethinking Public Key Infrastructures and Digital Certificates; Building in Privacy", 1st ed. MIT Press, 2000. ISBN 0-262-02491-8.
Trust Management and Access Control
Ji-Won Byun, Ninghui Li. "Purpose based access control for privacy protection in relational database systems". VLDB J. 17(4): 603-619 (2008).
OASIS eXtensible Access Control Markup Language (XACML) standard
Enterprise Privacy Authorization Language (IBM alternative to XACML submitted for standardization to the W3C in 2003)
Dutch Policy Reports
Gewoon Doen. Beschermen van veiligheid en persoonlijke levenssfeer. Rapport van de Adviescommissie Brouwer-Korf Veiligheid en persoonlijke levenssfeer, Januari 2009. (local copy)
J. Koffijberg, S. Dekkers, G. Homburg, B. van den Berg[Niets te verbergen en toch bang], Regioplan Beleidsonderzoek publicatienr. 1774, January 2009.
Data voor daadkracht, Rapport van de Adviescommissie Informatiestromen Veiligheid, April 2007. (local copy)
G.W. van Blarkom, drs. J.J. Borking Beveiliging van persoonsgegevens. Achtergrondstudies en Verkenningen 23, Registratiekamer, Den Haag, april 2001.
Anton Vedder, Leo van der Wees, Bert-Jaap Koops, en Paul de Hert: Van privacyparadijs tot controlestaat? Misdaad- en terreurbestrijding in Nederland aan het begin van de 21ste eeuw. Studie 49, Rathenau Instituut, Den Haag, Februari 2007.