Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D3.1: Overview on IMS
Table Of Content
- Executive Summary
- Introduction
- Definition of Types of IMS
- Structuring IMS
- Introduction
- Structure for the Database
- Structuring Identity Management Systems from the Product View
- Designs of IMS
- Liberty Alliance and Sun Java Access Manager
- Web Services, the Claims-Based Security Model and Federated Identity Management
- Case Study: Enterprise Identity Management in a Bank
- Premises
- Feasibility
- Pilot Project
- Administration Related to the Introduction of the EIM System
- Long Term Functional Expectations, Future Prospects
- Summary and Assessment
- iManager – Identity Manager for Partial Identities
- Identity Management with Partial Identities
- Data Structure of a Partial Identity
- Architecture of the iManager
- Summary
- The idemix Credential System
- Privacy Enhancing Concepts
- Mechanisms to Meet Requirements of IMS with Respect to Privacy
- Introduction
- Type 1 IMS: Account Management Systems
- Type 2 IMS: Profiling
- Type 3 IMS: User-Controlled Context-Related Role and Pseudonym Management
- Good Practice Examples and Considerations of Privacy Enhancing Technical Implementation of These Mechanisms
- Type 1 IMS: Account Management Systems
- Type 2 IMS: Profiling Systems
- Type 3 IMS: User-Controlled Context-Dependent Role and Pseudonym Management
- Summary
- Research and Development Topics
- Research and Development in Type 1 IMS
- Research and Development in Type 3 IMS
- Identity Commons / OASIS XDI/XRI Standards
- LID ‑ Light-Weight Identity Management
- Biometric Secured Client-Side Identity Management
- Integration, Advanced Prototyping and Basic Research
- Summary
- Conclusion and Outlook
- Glossary
- References
- Indices