Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D3.6: Study on ID Documents
Within the project “Provide eGovernment Good Practice Portability” (PPP) the eforum has constituted. Within this eforum stakeholders of eIDs from the public and the private sector analyse good practice and try to transfer knowledge. A working group within the eforum currently is working on privacy enhancing concepts for authentication of citizen that is able to use existing PKI. Basing on the concept of reverse proxies and on user’s certificates from cards for electronic signatures sector specific personal identifiers similar to the Austrian ssPIs are generate by trusted third parties (identity management providers). It is planned to use technical elements of the Austrian solution for example the modification of identifiers by hashing data from certificates with sector data. In difference to the Austrian ssPIs this solution can be used with already established PKI and signature solutions by adding identity management providers. The use of specially coded citizen cards and additional client side software does not seem to be necessary. In addition the use of X.509 compliant certificates is planned to establish compatibility with security standards such as SSL/TLS V1.0.
Within this year the publication of a concept and a pilot implementation are planned.
Denis Royer | 37 / 56 |