Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
Identity of Identity.
Interoperability.
Profiling.
Forensic Implications.
HighTechID.
D3.1: Overview on IMS.
D3.2: A study on PKI and biometrics.
D3.3: Study on Mobile Identity Management.
D3.5: Workshop on ID-Documents.
D3.6: Study on ID Documents.
D3.7: A Structured Collection on RFID Literature.
D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
D3.10: Biometrics in identity management.
D3.11: Report on the Maintenance of the IMS Database.
D3.15: Report on the Maintenance of the ISM Database.
D3.17: Identity Management Systems – recent developments.
D12.1: Integrated Workshop on Emerging AmI Technologies.
D12.2: Study on Emerging AmI Technologies.
D12.3: A Holistic Privacy Framework for RFID Applications.
D12.4: Integrated Workshop on Emerging AmI.
D12.5: Use cases and scenarios of emerging technologies.
D12.6: A Study on ICT Implants.
D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
D12.10: Normality Mining: Results from a Tracking Study.
Privacy and legal-social content.
Mobility and Identity.
Other.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
D3.2: A study on PKI and biometrics
Document Scope and Content
This document has a broad scope, covering particularly the technical and legal aspects of Public Key Infrastructures, and Biometrics, with a focus on the possibility of privacy-enhancing implementations.
Chapter considers PKIs and digital signatures by introducing their application and analysis of the key terminology as described in the EU Directive 1999/93/EC. Following this, the chapter examines the technical aspects of PKIs and their implementation. The inherent security and privacy aspects that are bought about by their specific implementation are then discussed. The EU has initiated some legal directives regarding electronic signatures and pseudonyms for electronic signatures, and these are presented and discussed in section . This is followed by an analysis of the current acceptance of electronic signatures and in particular analysis on current efforts to diffuse qualified electronic signatures. Finally, this section concludes with the examination of a case study on mobile signatures.
Chapter tackles the rapidly expanding field of Biometrics. It starts by introducing the key facets of the technology, and by discussing the various methodologies that are being currently adopted. Then the technological aspects are presented and more detail is given by showing how such approaches can be divided into two broad groups of active and passive biometrics. A discussion follows of the important issues of privacy and security pertaining to the use and implementation of biometric systems. This is achieved by considering the technical, formal and informal aspects of privacy and security. Next, a case study of Secure Storage Biometric Smart Cards is presented and analysed, followed by consideration of the broader implications of implementing biometric systems, from the social, political and economic perspectives.
Chapter attempts to draw a common thread between PKIs and Biometrics by considering the possibilities of biometric-enhanced PKI systems. It draws a distinction between the three methods by which this may be achieved, and illustrates them using the BEE recommendations (IST-20078 BEE) and BioVision project.
Chapter draws conclusions from this document.
Denis Royer | 5 / 40 |