Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication
List of Abbreviations
AC Access Control
ACK Acknowledgement
ADSL Asymmetric Digital Subscriber Line
AES Advanced Encryption Standard
AES-CCMP AES-Counter Mode CBC-MAC Protocol
AH Authentication Header
AN.ON Anonymity Online
APOP Authenticated Post Office Protocol
APPEL A P3P Preference Exchange Language
ASCII American Standard Code for Information Interchange
ATM Asynchronous Transfer Mode
B channel Bearer channel
BD_ADDR Bluetooth Device ADDRess
CBC Cipher Block Chaining
CCMP Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
CHAP Challenge Handshake Authentication Protocol
CL-signature Camenisch/Lysyanskaya signature
CMTS Cable Modem Termination System
CNAME Canonical Name
CPExchange Customer Profile Exchange
CR Carriage Return
CRC Cyclical Redundancy Check
CSMA/CD Carrier Sense Multiple Access/Collision Detection
D channel Delta channel
DENIC Deutsches Network Information Center (German NIC)
DES Data Encryption Standard
DFN Deutsches Forschungsnetz (Germany)
DHCP Dynamic Host Configuration Protocol
DNS Domain Name System
DNSSEC Domain Name System Security Extensions
DOCSIS Data Over Cable Service Interface Specifications
DOS Denial of Service
DPA Data Protection Authority
DPAL Declarative Privacy Authorization Language
DPD Data Protection Directive
DRM Digital Rights Management
DSL Digital Subscriber Line
DSLAM Digital Subscriber Line Access Multiplexer
DSS Digital Signature Standard
DSSS Direct Sequence Spread Spectrum
DTLS Datagram Transport Layer Security
DynDNS Dynamic Domain Name System
EAP Extensible Authentication Protocol
EC European Commission
E-HIP E-Health Information Platforms
EPAL Enterprise Privacy Authorization Language
EPML Enterprise Privacy Markup Language
E-P3P Platform for Enterprise Privacy Practices
ESP EncapSulated Payload
EU European Union
FIND Future Internet Network Design
FHSS Frequency Hopping Spread Spectrum
FP Framework Programme
FTP File Transfer Protocol
FTPS File Transfer Protocol Secure
GENI Global Environment for Networking Innovations
Geopriv Geographic Location/Privacy
HTML HyperText Markup Language
HTTP HyperText Transfer Protocol
HTTPS HyperText Transfer Protocol Secure
IBBT Interdisciplinair instituut voor BreedBand Technologie (Belgium)
IBM International Business Machines Corporation
ICANN Internet Corporation for Assigned Names and Numbers
ICMP Internet Control Message Protocol
ICT Information and Communication Technologies
ID Identifier
ID-WSF Identity Web Service Framework
IEEE Institute of Electrical and Electronics Engineers
IETF Internet Engineering Task Force
IMAP Internet Message Access Protocol
IP Internet Protocol
IPTV Internet Protocol TeleVision
IPv4 Internet Protocol Version 4
IPv6 Internet Protocol Version 6
IPSec Internet Protocol Security
IR InfraRed
IRTF Internet Research Task Force
ISDN Integrated Services Digital Network
ISO International Organization for Standardization
ISOC Internet Society
ISP Internet Service Provider
LAN Local Area Network
LAPD Link Access Protocol – D channel
LBS Location Based Services
LCP Link Control Protocol
LF Line Feed
LLC Logical Link Control
MAC Media Access Control
MB Megabyte
MBit MegaBit
MIKEY Multimedia Internet KEYing
MIME Multipurpose Internet Mail Extensions
MPEG Moving Picture Experts Group
MPEG-2 Moving Picture Experts Group Version 2
MPPE Microsoft Point-to-Point Encryption
NAT Network Address Translation
NGIP Next Generation Internet Protocols
NIC Network Information Center
No. Number
NoE Network of Excellence
NSF Nation Science Foundation (United States)
OASIS Organization for the Advancement of Structured Information Standards
ODRL Open Digital Rights Language
OMA Open Mobile Alliance
OSI Open System Interconnection
OWL Web Ontology Language
PAN Personal Area Network
PAP Password Authentication Protocol
PDU Protocol Data Unit
PET Privacy-Enhancing Technologies
PGP Pretty Good Privacy
PIN Personal Idenfitication Number
PKCS Public Key Cryptography Standards
PKI Public Key Infrastructure
PLCP Physical Layer Convergence Protocol
POP Post Office Protocol
POP3 Post Office Protocol Version 3
POTS Plain Old Telephone Service
PPP Point-to-Point Protocol
PPPoE PPP over Ethernet, Point-to-Point Protocol over Ethernet
PRIME Privacy and Identity Management for Europe (FP6 Integrated Project)
PRML Privacy Rights Markup Language
Protune PROvisional TrUst NEgotiation
PSTN Public Switched Telephone Network
P3P Platform for Privacy Preferences
QoS Quality of Service
RADIUS Remote Authentication Dial In User Service
RBAC Role Based Access Control
RC4 Rivest Cipher 4
REWERSE REasoning on the WEb with Rules and Semantics (FP6 NoE)
RF Radio Frequency
RFC Request for Comments
RFID Radio Frequency Identification
RR Receiver Report
RTCP Real-Time Control Protocol
RTP Real-Time Transport Protocol
RSA Rivest, Shamir, Adleman
s second
SA Security Association
SAML Security Assertion Markup Language
SCTP Stream Control Transmission Protocol
SDES Sender DEScription
SIGTRAN Signal Transport
SIP Session Initiation Protocol
SLAAC StateLess Address AutoConfiguration
SMTP Simple Mail Transfer Protocol
SNMP Simple Network Management Protocol
SOAP Simple Object Access Protocol
SOUPS Symposium On Usable Privacy and Security
SPI Security Parameter Index
SSID Service Set Identifier
SSH Secure SHell
SSL Secure Socket Layer
SSO Single Sign-On
STS Security Token Services
SYN SYNchronisation
TC Technical Committee
UCAID University Corporation for Advanced Internet Development
UDP User Datagram Protocol
UK United Kingdom
URI Uniform Resource Identifier
URL Uniform Resource Locator
U.S. United States (of America)
TCP Transmission Control Protocol
TKIP Temporal Key Integrity Protocol
TLS Transport Layer Security
TTL Time to live
VoIP Voice over IP / Voice over Internet Protocol
VPN Virtual Private Network
WEP Wired Equivalent Privacy
WiFi Wireless Fidelity
WLAN Wireless Local Area Network
WP Work Package
WPA Wi-Fi Protected Access
WPA2 Wi-Fi Protected Access Version 2
WS Web Services
WSDL Web Services Description Language
WSPL Web Services Policy Language
WSS Web Services Security
WWW World Wide Web
W3C World Wide Web Consortium
XACL XML Access Control Language
XACML eXtensible Access Control Markup Language
XML eXtensible Markup Language
XMLDSIG eXtensible Markup Language Digital SIGnature
XPath XML Path Language
XPref XPath-based Preference Language
X-WiN X-WIssenschaftsNetz (Germany)
schulte | 30 / 30 |