Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- D2.1: Inventory of Topics and Clusters.
- D2.2: Set of use cases and scenarios.
- D2.3: Models.
- D2.6: Identity in a Networked World – Use Cases and Scenarios.
- D2.13: Virtual Persons and Identities.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- Identity of Identity.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D2.2: Set of use cases and scenarios
Conclusion
The concepts defined in this article, especially both concepts of subjects and of virtual persons, allow a better description and understanding of many identification, authentication and authorization schemes, by creating a generic model. We have seen that we can apply this model in a diversity of examples: username/password, border control, finding someone in a chatroom.
The concept of virtual persons allows a unified handling of (currently) existing and/or non-existing subjects, even if the subjects are of different types. It serves as a basis for the definitions of identity, identification and the like.
Pseudonyms become a special kind of identity. Authentication and authorization schemes become a special case of identification in our unifying model. Indeed, identification is not always linked to a subject anymore.
From a practical point of view, most identifications actually occur between virtual persons.
17 / 69 |