Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
Identity of Identity.
Interoperability.
Profiling.
Forensic Implications.
HighTechID.
D3.1: Overview on IMS.
D3.2: A study on PKI and biometrics.
D3.3: Study on Mobile Identity Management.
D3.5: Workshop on ID-Documents.
D3.6: Study on ID Documents.
D3.7: A Structured Collection on RFID Literature.
D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
D3.10: Biometrics in identity management.
D3.11: Report on the Maintenance of the IMS Database.
D3.15: Report on the Maintenance of the ISM Database.
D3.17: Identity Management Systems – recent developments.
D12.1: Integrated Workshop on Emerging AmI Technologies.
D12.2: Study on Emerging AmI Technologies.
D12.3: A Holistic Privacy Framework for RFID Applications.
D12.4: Integrated Workshop on Emerging AmI.
D12.5: Use cases and scenarios of emerging technologies.
D12.6: A Study on ICT Implants.
D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
D12.10: Normality Mining: Results from a Tracking Study.
Privacy and legal-social content.
Mobility and Identity.
Other.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management
Relevance of TC for Identity and Identity Management
The reason why TC is addressed in the context of FIDIS is mainly related to the fact that TC introduces new schemes and business cases based on trust establishment between computing platforms, which would definitely have considerable implications on identity based authentication and identity management schemes. On the other side, the specifications and protocols defined within the TCG seem to raise problems regarding privacy since they require the user to reveal some identification information about the platform he is using. TC seems ambiguous for many people when it comes to its capability for enhancing privacy or anonymity of identity and identification information.
It is therefore important to shed the light on the relevance of TC infrastructures used in identification and identity management systems, and to assess their possible effects on crucial aspects of identity and identity management such as strong authentication, user privacy and anonymity.
3 / 38 |