Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- D2.1: Inventory of Topics and Clusters.
- D2.2: Set of use cases and scenarios.
- D2.3: Models.
- D2.6: Identity in a Networked World – Use Cases and Scenarios.
- D2.13: Virtual Persons and Identities.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- Identity of Identity.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D2.1: Inventory of Topics and Clusters
General
Identifiers
access control, anonymity (relationship, …), authorisation, authentication, ANI (Automatic Number Identification)
certificate, certification authority, credential,
key (private or public),
identifier, ID, identifiability,
linkability / unlinkability (absolute or relative),
observability, unobservability,
profiling, pseudonyms (person, role, relationship, role-relationship, transaction), pseudonymity,
RFID,
signature,
Anonymisers / Transparence
logging, lure,
proxy,
relaying,
social translucence,
trace, traceable,
application vs. communication anonymity
anonymity metrics
24 / 29 |