Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D3.1: Overview on IMS
Glossary
Anonymity
Anonymity is the state of being not identifiable within a set of subjects, the anonymity set.
Authentication
Authentication in the context of Identity Management is the process of validating the alleged identity of a person. Authentication requires that a user (intending to perform a specific action) provides a credential that proves he is in fact the person he claims to be.
There are three main categories of credentials used to authenticate human users. Credentials are based on
something the user is (identifiers based on biometrics);
something the user has (hardware-based tokens such as smart cards/ software tokens such as digital certificates);
something the user knows (password or PIN).
Authentication methods can be combined in order to increase accuracy. It should be noted that while authentication is usually based on identification, authentication without identification is possible as well.
Authorisation
The process of determining, by evaluating applicable access control information, whether a user is allowed to have the specified types of access to a particular resource is called authorisation. This always requires authentication. Once a user is authenticated, he may be authorised to perform different types of access.
Credential
In the widest sense, a credential is a piece of information attesting to the truth of certain stated facts. Credentials are used in the process of authentication, and in this context are based on the following technologies: Biometrics, digital certificates, smart cards, passwords etc.
Identification
Identification of a subject is the process of linking this subject to an identity.
Identifier, ID
An identifier (ID) is a name or string of bits. IDs can be assigned to subjects and objects. An identifier for a subject – with respect to a given community – is any information that uniquely characterises this subject in this community.
Identity
An identity is a set of characteristics representing a subject.
Identity management
Identity management means managing the various partial identities, i.e., their valuation as “applicable to one self” (role taking) or forming them (role making). A prerequisite to choose the appropriate partial identity is to recognise the situation the person is acting in.
LDAP – Lightweight Directory Access Protocol
LDAP is a directory access protocol standardised by the Internet Engineering Task Force (IETF) within the Requests for Comments (RFCs) 1777, 1778, 1779 and 1781. It describes the communication between directory clients and servers and the structure of the content of directories, not the content of them itself.
Partial Identity
Each identity of a subject can comprise many partial identities of which each represents the subject in a specific context or role. Partial identities are subsets of attributes of a complete identity. On a technical level, these attributes are data.
Privacy
Privacy is the ability of a person to control the availability of information about and exposure of himself or herself. It is related to being able to function in society anonymously (including pseudonymous or blind credential identification).
Unlinkability
Unlinkability of two or more items (e.g., subjects, messages, events, actions, …) means that within this system, these items are no more and no less related than they are related concerning the a-priori knowledge.
XML – Extensible Markup Language
XML standardised by the World Wide Web Consortium (W3C) is a simple, flexible text format derived from SGML (ISO 8879).
27 / 31 |