Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
Identity of Identity.
Interoperability.
Profiling.
Forensic Implications.
HighTechID.
D3.1: Overview on IMS.
D3.2: A study on PKI and biometrics.
D3.3: Study on Mobile Identity Management.
D3.5: Workshop on ID-Documents.
D3.6: Study on ID Documents.
D3.7: A Structured Collection on RFID Literature.
D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
D3.10: Biometrics in identity management.
D3.11: Report on the Maintenance of the IMS Database.
D3.15: Report on the Maintenance of the ISM Database.
D3.17: Identity Management Systems – recent developments.
D12.1: Integrated Workshop on Emerging AmI Technologies.
D12.2: Study on Emerging AmI Technologies.
D12.3: A Holistic Privacy Framework for RFID Applications.
D12.4: Integrated Workshop on Emerging AmI.
D12.5: Use cases and scenarios of emerging technologies.
D12.6: A Study on ICT Implants.
D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
D12.10: Normality Mining: Results from a Tracking Study.
Privacy and legal-social content.
Mobility and Identity.
Other.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management
Annex 1: Glossary
AAA
AC’97
ACPI
AGP
AIK
AMD
API
APM
AR
ASIC
ATA
ATX
AVP
BIOS
BTX
CA
CC
CF
CMK
CPU
CRTM
CSP
CSS
CTSS
DAA
DDR
DES
DMA
DMVT
DNB
DRM
DTS
DVI
EAL
EAP
EBX
EEPROM
EFS
EK
EM64T
EMSCB
EPROM
EVM
FIFO
FIPS PUB
GPIO
GPL
GRUB
HD
HDD
HDTV
HMAC
HP
HT
I/O
IBM
ICH
IDE
IEC
IEEE
IETF
IKE
IKEv2
IPSec
iSCSI
ISO
KCM
KTM
LAN
LCD
LDAP
LEAP
LGA
LoM
LPC
LSM
MA
MBR
MCH
MD5
MK
MLS
MMC
MS-CAPI
MS-CSP
MSA
MSS
NAS
NGSCB
NIC
NIST
NMK
OTC
OTPROM
PATA
PCI
PCR
PDA
PDP
PEP
PKCS#11
PKI
PP
PPP
PS/2
PSD
RADIUS
RAID
RAM
RF
RFID
RNG
ROM
RPC
RTC
RTS
SATA
SCSI
SD
SDRAM
SHA-1 Secure Hash Algorithm 1
SLIM
SMBus
SML
SoC
SRAM
SRK
SSL
ST
SXGA
TBB
TCG
TCPA
TCS
TCSI
TDDL
TDDLI
TLC
TLS
TNC
TOE
TPM
TSP
TSPI
TSS
UDMA
ULV
USB
UXGA
VGA
VM
VMM
VoIP
VPN
WAN
WLAN
WSXGA
WWAN
WXGA
XGA
38 / 38 |