Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
Identity of Identity
D2.1: Inventory of Topics and Clusters
This document proposes an inventory of topics and clusters for the Identity domain, which focuses on the identification and definition of the principal concepts and terms that are used in this field.
The objective is to provide to both the experts and the non-expert a vocabulary of well-defined terms facilitating the comprehension of the Identity domain, and improving the communication and circulation of knowledge related to the Identity topic.
- A methodological presentation of the approach used to construct this document
- An overall presentation of the main Identity concepts
- An inventory of Identity terms
- A concluding section
[ Download ] [ Read Online ]
D2.2: Set of use cases and scenarios
The objective of this document is to propose a very concrete and multi-disciplinary presentation of identity issues via the provision of a series of cases, stories, scenarios and perspectives.
Each of these cases, stories, etc, has been elaborated by a different member of the FIDIS consortium.
[ Download ] [ Read Online ]
D2.3: Models
The objective of this document is to present, in a synthetic way, different models of representation of a person that can be used in different application domains.
- Different processes that can be used to manage person’s information (types of IMS);
- Different categories of attributes (data schema) that can be used to represent a person, and the different domains in which they are used;
- Different approaches used to acquire person’s information.
This document is aimed at an audience of non-experts and experts who are interested in a broad overview of existing models. This document does not aim to be exhaustive, rather it aims to help the reader better understand the level (and detail) to which the identity of a person can be represented in different domains and what the processes used for dealing and manipulating it are.
[ Download ] [ Read Online ]
D2.6: Identity in a Networked World - Use Cases and Scenarios
The goal of this deliverable is the creation of a high quality output for publicdiffusion, i.e. starting from the technically challenging contributions in D2.2towards a more "digestible" and more attractive form for a wider public, notnecessarily specialised. Hence seven articles have been elaborated to a formappropriate for the special needs.
The form of the main part of this deliverable consists therefore of a bookletwith 16 pages, included in its electronic form as Appendix A of the presentdocument. The main goal is not the electronic version itself but a printed highquality version of the appendix A that is produced.
[ Download ] [ Read Online ]
D2.12: Time for Synthesis – Identity [R]Evolution (Booklet)
Deliverables 2.12. Time for Synthesis– Identity [R]Evolution (Booklet), represent a work aiming at presenting FIDIS in an engaging way to the general community of people interested by the concept of Identity. The objective of this approach was to strike people imagination, in particular contributing to augment FIDIS presence and impact.
The core of this work is the booklet Identity [R]Evolution, a set of representative futuristic scenarios of the topics covered in FIDIS (which content originates from FIDIS deliverable D12.5 : Use cases and scenarios of emerging technologies), as well as a brief presentation of the work to be presented for the FIDIS Submit Event in Cyprus in May 2009, and available in the FIDIS Summit Book.
This deliverable is delivered in multiple forms:
• A high quality 60 pages printed booklet.
• The web availability of this booklet (using pretty visualization)
• An associated set of videos of the FIDIS sessions taken at the FIDIS Summit Event in Cyprus in May 2009, and also made available on the web
[Download]
D2.13 Virtual Persons and Identities
The objective of this document is to describe typical uses of the term “virtual
person”, as well as to define a generic two-layer model based on virtual
persons. This model not only covers current uses of the term, but generalizes its
domain of application in order to better describe and understand new forms of
identities in the Information Society in relation with rights, duties, obligations
and responsibilities. We model in particular the concept of identity in the
Information Society.
Some sections in this document are aimed at an audience of non-experts; others
are for experts who are interested in applying the model based on virtual
persons to represent new forms of identities, as well as to describe identification
and authentication processes in the Information Society.
[ Download ] [ Read Online ]
D3.17: Identity Management Systems – recent developments
This document describes and analyses developments and trends on the market
for IMS in the recent years including current standardisation efforts. Use cases
describe such new types of IMS. Trends in the development of new IMS gave
an initiative to revise the typology for IMS developed within FIDIS.
[ Download ]
D9.6: Identity in the Information Society (IDIS) Journal”
Deliverable 9.6 is a major academic publisher’s rolling e-journal to commence in January 2008
(dependent upon signature of contract) –specified in FIDIS work plan 4. It was classified as a
‘deliverable type other’ with the goal of delivering a long-lasting ISSN journal
published by a major academic publishing house.
The contract with Springer, the publisher of Identity in the Information Society Journal (IDIS)
was signed in December 2007 and the Journal was formally launched in January 2008 on the
Springer portal at: www.springer.com/computer/programming/journal/12394 Currently
with 12 original articles available with open access.
ISSN: 1876-0678
A report on the Journal’s set up and operation during the first year of 2008 is available in the
following deliverable 9.7, completed in December 2008
[Download]
D17.1: Modelling New Forms of Identities: Applicability of the
The objective of this document is to illustrate the applicability of the model
based on virtual persons, model developed in FIDIS deliverable D2.13.
First, typical use-cases are described using the model based on virtual persons
as well as the traditional one-to-one, one-to-many or even many-to-many
models. This allows comparing the efficiency of those models, i.e., their ability
to faithfully describe the observed reality.
Then, a UML-description of the model based on virtual persons is given to
show the internal consistency of this model.
[Download]
D17.4: Trust and Identification in the Light of Virtual Persons
The purpose of this deliverable is to pinpoint and explicit fundamental
difficulties related to identification and trust in the digital world. The idea is to
illuminate and analyze them from the perspective of the “virtual person” model,
which has been a major research topic in previous FIDIS deliverables.
First the core concepts of trust, confidence and identification are defined and
analyzed in traditional contexts. Then, we discuss how these concepts can be
(re-)interpreted in the digital world and, more generally, in the light of virtual
persons in the virtual world.
[Download]