You are here: Resources > FIDIS Deliverables > HighTechID > D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication > 

D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication

Protocols – identifiers, identifiability, and personal data  Title:
CONCLUSION
 Application layer protocols

 

Conclusion

This section has introduced commonly used layer models for categorising network protocols. These models show that usage of higher-layer protocols involves also usage of protocols on layers below, yielding possible dependencies in the analysis of privacy criteria. However, due to a reduction of complexity, such cross-layer effects are not tackled in this deliverable. However, the layers structure forms the basis for the analysis later on in this chapter. 

Furthermore, this chapter has dealt with basic properties of potentially privacy-relevant data in protocols, i.e., identifiers, disclosure of directly personal data, and linkability enabling identifiability and/or profiling. It has also been stated that hidden identifiers may exist in protocol implementations. 

 

Protocols – identifiers, identifiability, and personal data  fidis-wp3-del3.8_Study_on_protocols_with_respect_to_identity_and_identification.sxw  Application layer protocols
schulte 8 / 30