@article{Muhle, author = {Muhle, Maria}, title = {The vitality of power. A genealogy of biopolitics with Foucault and Canguilhem}, series = {Revista de Ciencia Politica}, journal = {Revista de Ciencia Politica}, doi = {10.4067/S0718-090X2009000100008}, url = {http://nbn-resolving.de/urn:nbn:de:gbv:wim2-20170428-31735}, pages = {143 -- 163}, abstract = {This text proposes a genealogy of biopolitics based on Michel Foucault's thought, and on an understanding of it as a philosophico-political notion. In order to elaborate this genealogy, the text takes as its starting point not only politics but also life, as the second component of the term. The hypothesis is the following: To understand what biopolitics means, we have to take seriously Foucault's assertion of an indetermination of life, as the correlate of power and knowledge. This notion emerges in the epistemic break that takes place around 1800 and that entails the opening up of the notion of biopolitics under the name of governmentality, implying that life is not only the object of biopolitics but also serves as its model.}, subject = {Biopolitik}, language = {es} } @article{TatliLucks, author = {Tatli, Emin Islam and Lucks, Stefan}, title = {Mobile Identity Management Revisited}, series = {Electronic Notes in Theoretical Computer Science}, journal = {Electronic Notes in Theoretical Computer Science}, doi = {10.1016/j.entcs.2009.07.044}, url = {http://nbn-resolving.de/urn:nbn:de:gbv:wim2-20170426-31640}, pages = {125 -- 137}, abstract = {Identity management provides PET (privacy enhancing technology) tools for users to control privacy of their personal data. With the support of mobile location determination techniques based on GPS, WLAN, Bluetooth, etc., context-aware and location-aware mobile applications (e.g. restaurant finder, friend finder, indoor and outdoor navigation, etc.) have gained quite big interest in the business and IT world. Considering sensitive static personal information (e.g. name, address, phone number, etc.) and also dynamic personal information (e.g. current location, velocity in car, current status, etc.), mobile identity management is required to help mobile users to safeguard their personal data. In this paper, we evaluate certain required aspects and features (e.g. context-to-context dependence and relation, blurring in levels, trust management with p3p integration, extended privacy preferences, etc.) of mobile identity management}, subject = {Privatsph{\"a}re}, language = {en} }