Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- D5.1: A survey on legislation on ID theft in the EU and….
- D5.2: ID Fraud Workshop.
- D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research.
- D5.2c: Identity related crime in the world of films.
- D5.3: A Multidisciplinary Article on Identity-related Crime.
- D5.4: Anonymity in electronic government: a case-study analysis of governments? identity knowledge.
- D6.1: Forensic Implications of Identity Management Systems.
- D6.5/D6.6: Second thematic Workshop forensic implications.
- D6.7b: Workshop on Forensic Profiling.
- D6.7c: Forensic Profiling.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
Limitations of the described approaches
For the use of digital credentials, various technical concepts such as “Idemix” and “Credentica” were described and analysed in recent FIDIS deliverables, see Bauer, Meints and Hansen (2005) and Gasson, Meints and Warwick (2005). So far, digital credentials have not been used together with PKI and electronic signatures; the use of sector-specific PINs in Austria is limited to authentication and is not being used for electronic signatures. To implement this approach, two things currently not present would be needed:
a legal basis in the corresponding countries, and
technical prototypes and implementations.
Technical approaches have been discussed in the eforum in the context of the PPP project; scientific publications are in preparation but not available yet.
21 / 45 |