Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
Annex 1: Event Programme
==================
Meeting room: ‘The Sullivan Room’, Room 141 Cyb/Comp-Sci Building
Lunch / Coffee: ‘The Seminar Room’, Room 167 Cyb/Comp-Sci Building
==================
26th October 2006
8:45 am - 9:15 am: Meeting introduction
- Registration
- Welcome
- Short introduction of the participants
- Objectives of this workshop
- General schedule, internal reviewing process
9:15 am - 10:45 am: Session 1:
Presentation and discussion of work on Del. D12.3:
Holistic Privacy Framework for RFID Applications
Ending: April 2007
- Introduction and moderation by Simone Fischer-Hübner
- Contributions by participants
10.45 am - 11:00 am: Coffee break
11:00 am - 1:00 am: Session 2:
Presentation and discussion of work on Del. 12.3 continues
1:00 pm - 1:30 pm: Lunch
1:30 pm - 3:30 pm: Session 3:
Presentation and discussion of work on Del. 12.2:
Study on Emerging AmI Technologies
Ending: June 2007
- Introduction and moderation by Mark Gasson
- Contributions by participants
3:30 pm - 3:45 pm: Coffee break
3:45 pm - 5:45 pm: Session 4:
Presentation and discussion of work on Del. 12.2 continues
5:45 pm: CAVE system demo
==================
27th October 2006
8:45 am - 9:15 am: Day 2 introduction
- WP12 Motivational Lecture (Kevin Warwick)
- WP12 and WP7: D7.10
9:15 am - 10:45 am: Session 5:
D12.2 & D12.3: Final Thoughts? / Start of Session 6
10.45 am - 11:00 am: Coffee break
11:00 am - 1:00 am: Session 6:
Presentation and discussion of work on Del. D3.8:
Study on protocols with respect to identity and identification
Ending: Sep 2007
- Introduction and moderation by Martin Meints
- Contributions by participants
1:00 pm - 1:30 pm: Lunch
1:30 pm - 3:30 pm: Session 7:
Presentation and discussion of work on Del. 3.8 continues
3:30 pm - 3:45 pm: Coffee
3:45 - 4:00 pm: Session 8:
Meeting conclusion
Denis Royer | 8 / 10 |