Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- D2.1: Inventory of Topics and Clusters.
- D2.2: Set of use cases and scenarios.
- D2.3: Models.
- D2.6: Identity in a Networked World – Use Cases and Scenarios.
- D2.13: Virtual Persons and Identities.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- Identity of Identity.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D2.2: Set of use cases and scenarios
References
FIDIS D2.1 (2005), “Del. 2.1: Inventory of Topics and Clusters”, FIDIS deliverable 2.1, September 2005; available at the FIDIS web site: http://www.fidis.net/
Goodman, David, editor (2004); “Towards understanding Identity”, eema, the independents european association for e-business www.eema.org.
Kent, Stephen T., and Lynette I. Millet, editors (2004); “Who goes there? Authentication through the lens of privacy”, The National Academic Press, Washington DC.
Pfitzmann, Andrea and Marit Hansen, editors (2005), “Anonymity, unlinkability, unobservability, pseudonymity, and identity management – A consolidated proposal for terminology”, http://dud.inf.tu-dresden.de/Literatur_V1.shtml
18 / 69 |