Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D3.1: Overview on IMS
Scope of this Document
This document is directed to an audience of academics, EU policy-makers, experts from technological, social science and legal disciplines and interested citizens. It contains an overview on existing and planned identity management systems (IMS). The overview is by no means comprehensive, but major types, classes and subclasses of IMS are described and examples of existing IMS including some prototypes and concepts are given. In addition representative designs are included as privacy enhancing concepts illustrated by examples of implementation of those concepts.
This study is focused on IMS types, such as account management systems (type 1) and user-controlled context-dependent role and pseudonym management (type 3). For the IMS type profiling systems (type 2), only a few examples are given. Profiling systems will be examined under technological, privacy-related and legislative aspects, among others, in Workpackage 7 (Deliverables 7.2, 7.3 and 7.4).
4 / 31 |