Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
Identity of Identity.
Interoperability.
Profiling.
Forensic Implications.
HighTechID.
D3.1: Overview on IMS.
D3.2: A study on PKI and biometrics.
D3.3: Study on Mobile Identity Management.
D3.5: Workshop on ID-Documents.
D3.6: Study on ID Documents.
D3.7: A Structured Collection on RFID Literature.
D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
D3.10: Biometrics in identity management.
D3.11: Report on the Maintenance of the IMS Database.
D3.15: Report on the Maintenance of the ISM Database.
D3.17: Identity Management Systems – recent developments.
D12.1: Integrated Workshop on Emerging AmI Technologies.
D12.2: Study on Emerging AmI Technologies.
D12.3: A Holistic Privacy Framework for RFID Applications.
D12.4: Integrated Workshop on Emerging AmI.
D12.5: Use cases and scenarios of emerging technologies.
D12.6: A Study on ICT Implants.
D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
D12.10: Normality Mining: Results from a Tracking Study.
Privacy and legal-social content.
Mobility and Identity.
Other.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
D3.7 A Structured Collection on Information and Literature on Technological and Usability Aspects of Radio Frequency Identification (RFID)
Abbreviations and Glossary
EPC- electronic product code
ICAO – International Civil Aviation Organization
IHVS - Intelligent Highway Vehicle Systems
ISO – International Standardization Organization
MRTD – machine readable travel documents
PET – privacy enhancing technology
RFID – radio frequency identification
SCM – supply chain management
electronic product code (EPC) - a code electronically recorded on an RFID tag [wikipedia April 2006]
PETs – are defined as “a coherent system of ICT measures that protects privacy […] by eliminating or reducing personal data or by preventing unnecessary and/or undesired processing of personal data; all without losing the functionality of the data system.” (Borking 1996, translation taken from Borking, Raab 2001).
RFID-system - may consist of several components: tags, tag readers, edge servers, middleware, and application software. The purpose of an RFID system is to enable data to be transmitted by a mobile device, called a tag, which is read by an RFID reader and processed according to the needs of a particular application. The data transmitted by the tag may provide identification or location information, or specifics about the product tagged, such as price, color, date of purchase, etc. [wikpedia April 2006]
RFID-tag - a small object that can be attached to or incorporated into a product, animal, or person. RFID tags contain silicon chips and antennas to enable them to receive and respond to radio-frequency queries from an RFID transceiver [wikipedia April 2006]
reader – see transceiver
sensor - a physical device or biological organ that detects, or senses, a signal or physical condition and chemical compounds; an electronic sensor is a type of transducer [wikipedia April 2006]
transceiver - a device that has a transmitter and a receiver which are combined [wikipedia April 2006]
transducer - a device, usually electrical or electronic, that converts one type of energy to another for the purpose of measurement or information transfer. Most transducers are either sensors or actuators [wikipedia April 2006]
transponder - a receiver-transmitter that will generate a reply signal upon proper electronic interrogation. [wikipedia April 2006]
ubiquitous computing - the method of enhancing computer use by making many computers available throughout the physical environment, but making them effectively invisible to the user [Mark Weiser 1993, available at: www.ubiq.com/hypertext/weiser/UbiCACM.html]
|
|
|
Denis Royer | 43 / 46 |