Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
Table Of Content
- Executive Summary
- Introduction
- Background and Motivation (Setting the Scene)
- Related work
- Document Structure
- RFID basics
- Scenarios
- (S1) Scenario 1: Attack on an RFID System
- (S2) Scenario 2: Enhanced proximity card
- (S3) Scenario 3: An Identity Manager for RFID Tags
- Scenarios from D7.7
- (S4) Case study: the Metro Future Store in Rheinberg
- (S5) Case-study: Usage of RFID Technology in Educational Settings
- (S6) RFID at the CVS Corporation
- (S7) Scenario for social inclusion
- Summary
- The Problem
- Space
- Introduction
- Legal aspects
- Information in RFID tags that qualify as personal data
- What laws/ directives apply?
- Legal issues relevant with RFID applications in data protection
- Related Findings from FIDIS D7.7
- Findings of D7.7: the need for PETs and TETs
- Ethical aspects
- Codes of ethics and conduct
- Constructing Codes of Conduct
- Socio-Economic and RFID technology inherent considerations
- Impossibility of Avoidance
- Lack of Awareness
- Controllability, perceived Control and Usability
- Reduction of Expenses weakens Capabilities
- Technical and organisational security aspects
- General security risks
- Privacy Risks in relation to Security
- Information Security
- Problem Summary and Conclusions
- An Holistic Approach to Privacy-Enhancements
- Factors for technology acceptance and their importance in ambient intelligent environments
- Results of the TAUCIS Study
- Recommendations on technology acceptance
- RFID technology and the notion of personal data
- Processing of personal data in RFID applications and systems
- Obligations for making data processing legitimate
- Information to be given to the data subject and his privacy rights
- Obligation to provide appropriate technical and organisational measures
- Privacy principles for system design
- Code of conduct approaches to privacy friendliness
- RFID Bill of Rights by Garfinkel
- Constructing Codes of Conduct – The Toronto Resolution
- Raising Public Awareness
- Technical approaches to privacy friendliness
- Privacy Enhancing Measures and Technologies
- The Sleep-Command
- Blocking
- Access to the tags
- Controlling Access by Authentication
- Using cryptography to enhance privacy
- Tracking
- Privacy enhancements by pseudonym usage
- Privacy by voluntary commitment
- Controlling the voluntary commitment
- A first approach
- Work in progress in D7.9: Ambient Law
- Conceptualisation of Ambient Law
- Three scenarios of AmI
- Conclusion
- s
- Bibliography