1. Borcea, K., Donker, H., Franz, E., Liesebach, K., Donker, H., Wahrig, H.: Intra-Application Partitioning of Personal Data. In: Proceeding of the Workshop on Privacy-Enhanced Personalization (PEP 2005), UC Irvine Institute for Software Research (ISR), July 2005, pp. 67–74 (2005)
2. Canetti, R., Gennaro, R., Herzberg, A., Naor, D.: Proactive security: Long-term protection against break-ins. RSA Laboratories’ CryptoBytes 3(1), 1–8 (1997)
3. Chaum, D.: Security without Identification: Transaction Systems to Make Big Brother Obsolete. Communications of the ACM 28(10), 1030–1044 (1985)
4. Clauß, S., Hansen, M., Pfitzmann, A., Raguse, M., Steinbrecher, S.: Tackling the challenge of lifelong privacy. In: eChallenges (October 2009)
5. Hansen, M., Borcea-Pfitzmann, K., Pfitzmann, A.: PRIME - Ein europäisches Projekt für nutzerbestimmtes Identitätsmanagement. It - Information Technology, Oldenbourg 6(47), 352–359 (2005)