Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D3.1: Overview on IMS
Conclusion and Outlook
In general, we notice that the originally quite strict borders between the defined three types of IMS are diminishing. Type 1 IMS (account management systems) currently are expanding towards customer relationship management (CRM), which could as well be used in the context of type 2 IMS. In addition to the organisation-side view type 2 IMS (profiling systems) have a client-side view, which could as well be considered to be identity management of type 3. The categorisation into three types originally designed for different products still serves well to describe a certain view on more and more integrated solutions.
To demonstrate further areas of activity within the FIDIS Network we want to use a common economic model [SCH96]. This describes four phases for the lifecycles of products:
Phase 1: experimental or access phase
Phase 2: expansion phase
Phase 3: maturity and stagnation phase
Phase 4: regression phase
Using this model with the identified types of IMS we observe that IMS of the types 1 and 2 are in the second phase (expansion) of this model, IMS of type 1. The mechanisms of market (like competition of various manufacturers, supported standards like LDAP, SQL etc.) are working quite well with these types of IMS. Looking at IMS of type 3 we observe that they are in the phase 1 (experimental). The large variety of existing solutions presented in this document, the low degree of commercial activities (compared to the IMS of Type 1 and 2) and significant public activities (public promoted projects, public research) lend support to this classification.
Looking at technological aspects of the described types of IMS there is no public technology promotion necessary for IMS of type 1 and 2. Areas of research and development are integration of related and so far independent systems and technologies. This could lead to further development of the framework of European legislation (especially in the sector of privacy compliance) or its application.
While the necessity for activities in the legislation is the same with type 3 IMS as with IMS of type 1 and 2 there are additional needs. Barriers towards expanding markets (phase 2 of the economic model) and possible activities for overcoming those barriers are:
The perception differs widely of what identity management is. A clearer taxonomy and public awareness are necessary.
While current concepts and technologies for identity management are not commonly understood new technologies such as RFID and Ambient Intelligence are emerging. The technical opportunity of remote readout of e.g. the RFID without any notice by the user raises new questions towards identity management. Most today established IMS know an authentication done actively by the user.
In addition known technologies, such as the use of mobile devices and biometrics are developing towards new services or applications (e.g. location based services and ID documents). The public reception influenced by technology friendly placement and a lack of integrated concepts is dominated by the discussion of risks. Technological, political, social and economic opportunities have to be looked at in combination with legislation (including human rights and privacy compliance). As a result there will be recommendations for further integrated technological development and development of legislation towards those technologies.Integration of the existing, technologically feasible solutions is generally poor, interoperability therefore a major area of interest.
While there are some prototypes with good usability features (e.g. iManager), many tools and application examined in this document are of poor usability (e.g. first generation remailers). This applies especially to those tools addressing special technical solutions for privacy compliance. To gain a better acceptance in the market, usability has to be improved.
For type 3 IMS privacy, compliance is a unique selling proposition. On the other hand dependability and risk minimisation (understood as elements of security) are important for the provider of commercial or governmental services. This disjunction is leading to a separate discussion on fraudulent use together with criminal and forensic aspects of identity and identity management. Recommendations for further development of legislation based on an integrated understanding of the underlying technologies and social systems could be one result of this discussion.
The FIDIS Network of Excellence will address those aspects. The workpackages in the current workplan are designed to meet the described requirements. Basing upon the results and suggestions of this and other documents produced within the FIDIS Network the workplan will be updated.
26 / 31 |