Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication
In the previous chapter, commonly used protocols for networking were analysed regarding their privacy properties. This chapter deals with privacy-aware communication and gives an overview of techniques and developments in three different areas:
Anonymisation services;
User-centric identity management;
Privacy policies and their enforcement.
The systems and properties described are not in all cases regarded as “protocols”, but on the one hand the definition given in Chapter (Wikipedia: Protocol (computing) 2007) covers the depicted techniques, and on the other hand they are important to understand current developments in the privacy area to cope with some of the privacy threats the use of protocols and ICT systems in general poses.
The three areas elaborated in this chapter are not orthogonal. Depending on the definition, “identity management” can be regarded as superordinate to the other two terms. However, in Section 3.2 a focus is put on credentials and standards for federated identity management rather than also comprising anonymity or policy features.
In principle the protocol layers introduced in Section 2.1.1 also apply for this chapter, but in current implementations the techniques for privacy-aware communication are realised in higher layers in the protocol stack (i.e., on the application layer) because it is assumed that today’s existing infrastructure is being used and cannot easily be exchanged by privacy-enhancing developments also on the lower protocol layers.
schulte | 14 / 30 |