Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
Identity of Identity.
Interoperability.
Profiling.
Forensic Implications.
HighTechID.
D3.1: Overview on IMS.
D3.2: A study on PKI and biometrics.
D3.3: Study on Mobile Identity Management.
D3.5: Workshop on ID-Documents.
D3.6: Study on ID Documents.
D3.7: A Structured Collection on RFID Literature.
D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
D3.10: Biometrics in identity management.
D3.11: Report on the Maintenance of the IMS Database.
D3.15: Report on the Maintenance of the ISM Database.
D3.17: Identity Management Systems – recent developments.
D12.1: Integrated Workshop on Emerging AmI Technologies.
D12.2: Study on Emerging AmI Technologies.
D12.3: A Holistic Privacy Framework for RFID Applications.
D12.4: Integrated Workshop on Emerging AmI.
D12.5: Use cases and scenarios of emerging technologies.
D12.6: A Study on ICT Implants.
D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
D12.10: Normality Mining: Results from a Tracking Study.
Privacy and legal-social content.
Mobility and Identity.
Other.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
D3.3: Study on Mobile Identity Management
Table Of Content
- Introduction
- The Need for Mobile Identity Management
- Categorised Survey on traditional and privacy-enhancing Identity Management Mechanisms which are relevant for Mobile Identity Management
- Scenario of the use of Mobile Identity Management Systems
- Introduction
- Starting Point
- Scenario 1: Finding a local restaurant for a business lunch
- Scenario 2: Finding a local restaurant for a private lunch
- Required mechanisms for Mobile Identity Management Systems
- GSM-based Mobile Identity Management
- Elements of a mobile identity
- Profile management
- Exchanging mobile identities
- Applications for mobile identities
- Revenue Models for M-Commerce with Mobile Identity
- Mobile Identity and Web Services
- Mobile Web Services scenarios
- Privacy objectives related to billing/payment
- Privacy objectives related to authentication
- Discussion / conclusion: Summary of requirements
- Scenario – Ubiquitous Computing
- Object identification in mobile computing
- Linking a physical person with its digital identity
- Privacy for Mobile Users
- Freiburg Privacy Diamond
- Privacy in mobile ad hoc Networks
- Background
- Introduction to scenarios
- Initial usage scenarios
- Privacy problems in the scenarios
- Privacy-enhanced usage scenarios
- Ensuring location privacy in mobile ad hoc networks
- Future Work
- Privacy Risk of User Agent Systems in WAP based Systems
- Usability and Security for Mobile Identity Management Systems
- Studies on Usability of P3P for Mobile Phones
- Identity Management Mock-ups for Mobile Phones
- Summary
- Approaches for Mobile Identity Management Systems
- Freiburg Location addressing as anonymity mechanism
- mCrowd
- for anonymising WAP surfing
- Comparison of Anonymous Communication Mechanisms for ad hoc Networks
- Anonymous Communication Mechanisms
- Requirements for Anonymous Communication Mechanisms
- Comparison of Anonymous Communication Mechanisms
- Conclusions
- Anonymity in self-organising Networks – Difficulties and Concepts
- iManager – Identity Manager for Partial Identities of Mobile Users
- AXS ID-Card
- Conclusion and Outlook
- Glossary
- References