@article{TatliLucks, author = {Tatli, Emin Islam and Lucks, Stefan}, title = {Mobile Identity Management Revisited}, series = {Electronic Notes in Theoretical Computer Science}, journal = {Electronic Notes in Theoretical Computer Science}, doi = {10.1016/j.entcs.2009.07.044}, url = {http://nbn-resolving.de/urn:nbn:de:gbv:wim2-20170426-31640}, pages = {125 -- 137}, abstract = {Identity management provides PET (privacy enhancing technology) tools for users to control privacy of their personal data. With the support of mobile location determination techniques based on GPS, WLAN, Bluetooth, etc., context-aware and location-aware mobile applications (e.g. restaurant finder, friend finder, indoor and outdoor navigation, etc.) have gained quite big interest in the business and IT world. Considering sensitive static personal information (e.g. name, address, phone number, etc.) and also dynamic personal information (e.g. current location, velocity in car, current status, etc.), mobile identity management is required to help mobile users to safeguard their personal data. In this paper, we evaluate certain required aspects and features (e.g. context-to-context dependence and relation, blurring in levels, trust management with p3p integration, extended privacy preferences, etc.) of mobile identity management}, subject = {Privatsph{\"a}re}, language = {en} }