Resources
Deliverables of the FIDIS NoE (clustered by topics)
- D2.1: Inventory of Topics and Clusters
- D2.2: Set of use cases and scenarios
- D2.3: Models
- D2.6: Identity in a Networked World - Use Cases and Scenarios
- D2.12: Time for Synthesis – Identity [R]Evolution (Booklet)
- D2.13 Virtual Persons and Identities
- D3.17: Identity Management Systems – recent developments
- D9.6: Identity in the Information Society (IDIS) Journal”
- D17.1: Modelling New Forms of Identities: Applicability of the
- D17.4: Trust and Identification in the Light of Virtual Persons
- D4.1: Structured account of approaches on interoperability
- D4.2: Set of requirements for interoperability of Identity Management Systems
- D4.4: Survey on Citizen’s trust in ID systems and authorities
- D4.5: A Survey on Citizen’s trust in ID systems and authorities
- D4.6: Draft best practice guidelines
- D4.7: Review and classification for a FIDIS identity management model
- D4.8: Creating the method to incorporate FIDIS research for generic application
- D4.9: An application of the management method to interoperability within e-Health
- D4.11: eHealth identity management in several types of welfare states in Europe
- D4.12: A qualitative comparative analysis of citizens’ perception of eIDs and interoperability
- D7.2: Descriptive analysis and inventory of profiling practices
- D7.3: Report on Actual and Possible Profiling Techniques in the Field of Ambient Intelligence
- D7.4: Implications of profiling practices on democracy
- D7.6 Workshop on AmI, Profiling and RFID
- D7.7: RFID, Profiling, and AmI
- D7.8: Workshop on Ambient Law
- D7.9: A Vision of Ambient Law
- D7.10: Multidisciplinary literature selection, with Wiki discussion forum on Profiling, AmI, RFID, Biometrics and Identity
- D7.11: Kick-off Workshop on biometric behavioural profiling and Transparency Enhancing Technologies
- D7.12: Behavioural Biometric Profiling and Transparency Enhancing Tools
- D7.13: Where Idem Meets Ipse. Workshop Report
- D7.14a: Where Idem-Identity meets Ipse-Identity. Conceptual Explorations
- D7.14b: Idem-Identity and Ipse-Identity in Profiling Practices
- D7.15: Kick off Workshop on Profiling in Financial Institutions
- D 7.16: Profiling in Financial Institutions
- D5.1: A survey on legislation on ID theft in the EU and…
- D5.2: ID Fraud Workshop
- D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research
- D5.2c: Identity related crime in the world of films
- D5.3: A Multidisciplinary Article on Identity-related Crime
- D5.4: Anonymity in electronic government: a case-study analysis of governments’ identity knowledge
- D6.1: Forensic Implications of Identity Management Systems
- D6.5/D6.6: Second thematic Workshop forensic implications
- D6.7b: Workshop on Forensic Profiling
- D6.7c: Forensic Profiling
- D6.8a: Workshop on Identification of Images
- D6.8b: Identification of images
- D3.1: Overview on IMS
- D3.2: A study on PKI and biometrics
- D3.3: Study on Mobile Identity Management
- D3.5: Workshop on ID-Documents
- D3.6 Study on ID Documents
- D3.7: A Structured Collection on Information and Literature on Technological and Usability Aspects of Radio Frequency Identification (RFID)
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management
- D3.10: Biometrics in identity management
- D3.11: Report on the Maintenance of the IMS Database
- D3.12: Federated Identity Management – what’s in it for the citizen/customer?
- D3.13: Study on Usability of IMS
- D3.14: Model implementation for a user controlled biometric authentication
- D3.15: Report on the Maintenance of the ISM Database
- D3.15a: Report on the Maintenance of the IMS Database
- D3.16: Biometrics: PET or PIT?
- D3.17: Identity Management Systems – recent developments
- D3.18: Demonstration of a new approach for preserving identity and privacy in mobile transactions using Id-token with Trusted Computing
- D12.1: Integrated Workshop on Emerging AmI Technologies
- D12.2: Study on Emerging AmI Technologies
- D12.3: A Holistic Privacy Framework for RFID Applications
- D12.4: Integrated Workshop on Emerging AmI
- D12.5: Use cases and scenarios of emerging technologies
- D12.6: A Study on ICT Implants
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?
- D12.10: Normality Mining: Results from a Tracking Study
- D16.2b: Conference on E-Voting and Identity
- D13.1: Identity and impact of privacy enhancing technologies
- D13.1 Addendum: Identity and impact of privacy enhancing technologies
- D13.3: Study on ID number policies
- D13.4: The privacy legal framework for biometrics
- D13.6 Privacy modelling and identity
- D13.7: Workshop Privacy
- D13.8: Applicability of privacy models
- D13.9: Estimating Quality of Identities
- D13.12: Privacy – Self-valuation of communication traffic data
- D14.1: Workshop on Privacy in Business Processes
- D14.2: Study on Privacy in Business Processes by Identity Management
- D14.3: Study on the Suitability of Trusted Computing to support Privacy in Business Processes
- D14.4: Workshop on “From Data Economy to Secure Logging as a Step towards Transparency”
- D14.5 Experimental Study on Profiling in Business Processes
- D14.6: From Regulating Access Control on Personal Data to Transparency by Secure Logging
- D14.7: Analysis of contemporary security techniques with respect to identification in business processes
- D14.8: Privacy in Business Processes
- D15.3/D13.10: FIDIS International Summer School
- D16.3: Towards requirements for privacy-friendly identity management in eGovernment
- D16.4: Study on the relevance of Trusted Infrastructures for E-Voting
- D17.2: New (Id)entities and the Law: Perspectives on Legal Personhood for Non-Humans
- D17.3: Bridging the accountability gap: rights for new entities in the information society?
- D11.1: Collection of Topics and Clusters of Mobility and Identity – Towards a Taxonomy of Mobility and Identity
- D11.2: Mobility and LBS
- D11.3: Economic aspects of mobility and identity
- D11.4: Workshop on Mobility and Identity
- D11.5: The legal framework for location-based services in Europe
- D11.6: Survey on Mobile Identity
- D11.8: Study on Mobile Communities
- D11.9: Study on Traffic Monitoring
- D11.11: Next Generation Networks
- D11.12: Mobile Marketing in the Perspective of Identity, Privacy and Transparency
- D11.13: 3rd Thematic Workshop on Mobility and Identity
- D1.2: Fidis Communication Infrastructure
- D1.3: Manual of the Extended Wiki System ("DR_Wiki")
- D1.11: Identity Law Survey, Migrating from the Database to a Wiki
- D8.3: Database on Identity Management Systems and ID Law in the EU
- D8.5: Report on inter-disciplinary workshops
- D9.1: A Specification for FIDIS Journal
- D9.5: 1st FIDIS in-house Journal Issue (1/2007)
- D9.7: A Report on IDIS Journal: First Year 2008
- D9.8: A Report on IDIS 2008 Workshop
- D15.2: FIDIS International Summer School
- D15.4: Interdisciplinary FIDIS Doctorial Consortium
- D15.5: Identity of the mind, body and spirit
- D16.1: Conceptual Framework for Identity Management in eGovernment
- D19.3 Standardisation report (copy 1)
- D19.3 Standardisation report