Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D3.1: Overview on IMS
Structure and Content of this Document
This document is divided into four parts:
Part 1: Definition of types and structure of IMS
Part 2: Examples of good design of IMS
Part 3: Privacy enhancing concepts including good practice examples
Part 4: Research and development in the area of IMS and conclusions.
In the first part we define three types, three classes and various subclasses of identity management systems (IMS) (Chapters 3 and 4). A commented list on IMS gives an overview on existing implementations.
In the second part examples of typical designs for type 1 and type 3 IMS both from market and research labs are described (Chapter 5). This starts with the Liberty Alliance and the SUN Java System Access Manager (both IMS type 1) followed by an introduction in the concepts of claims-based security model and federated identity management (type 1) for web-services The examination of type 1 IMS is concluded by a case study of the introduction of an IMS type 1 in a bank in Hungaria. This is followed by the iManager (IMS type 3), a prototype of an identity management system developed for personal digital assistants (PDAs) gives an impression, how location based services can be introduced in IMS. The chapter is concluded by the presentation of idemix, a credential and zero knowledge protocol based identity management system (type 3). Type 2 IMS (profiling systems) will be discussed in the Deliverable 7.2 and not in this document.
The third part lists privacy enhancing criteria for all types of IMS. This part is concluded by considerations and good practice examples of the implementation of the described mechanisms (Chapter 6).
The fourth part looks into current areas of research and development of IMS. Relevant findings are summarised and conclusions especially for the FIDIS Network of Excellence are presented (Chapters 7 and 8).
5 / 31 |