You are here: Resources > FIDIS Deliverables > Identity of Identity > D2.2: Set of use cases and scenarios > 

D2.2: Set of use cases and scenarios

Identity and Identification  Title:
CONCLUSION
 References

 

Conclusion

The concepts defined in this article, especially both concepts of subjects and of virtual persons, allow a better description and understanding of many identification, authentication and authorization schemes, by creating a generic model. We have seen that we can apply this model in a diversity of examples: username/password, border control, finding someone in a chatroom. 

The concept of virtual persons allows a unified handling of (currently) existing and/or non-existing subjects, even if the subjects are of different types. It serves as a basis for the definitions of identity, identification and the like.  

Pseudonyms become a special kind of identity. Authentication and authorization schemes become a special case of identification in our unifying model. Indeed, identification is not always linked to a subject anymore. 

From a practical point of view, most identifications actually occur between virtual persons. 

 

Identity and Identification  fidis-wp2-del2.2.Cases_stories_and_Scenario_04.sxw  References
17 / 69