You are here: Resources > FIDIS Deliverables > Identity of Identity > D2.3: Models > 

D2.3: Models

The Representation of the Person in Different Application Contexts, and the Use of Standards  D2.3 Models
IDENTITY IN DIFFERENT APPLICATION CONTEXTS
 A Overview of Standards for the Representation of the Person

 

Identity in Different Application Contexts

  1.  

    The objective of this section consists mainly in providing the application context perspective of the work that was done in chapter . More concretely, it consists in identifying application domains in which identity represents a key role, and for each of them in indicating the set of attributes that are relevant for the representation of the person. It also mentions the relevant standards that can be used (although these standards will be presented more specifically later).

    This section provides us with a basic comparison of the approaches that are being used to represent the person in the different domains, and in particular what are the aspects in which they differ or on the contrary are very similar. 

     

    In the following table, we provide an overview of key aspects of identity in different application contexts, as well as some relevant standards. In some cases (for instance for Work and “Commerce”) we have distinguished the organisational perspective from the individual perspective is order to reflect different way the identity is managed. 

     

     

     

     

     

     

     

     

     

    The objective of this section consists mainly in providing the application context perspective of the work that was done in chapter . More concretely, it consists in identifying application domains in which identity represents a key role, and for each of them in indicating the set of attributes that are relevant for the representation of the person. It also mentions the relevant standards that can be used (although these standards will be presented more specifically later).

    This section provides us with a basic comparison of the approaches that are being used to represent the person in the different domains, and in particular what are the aspects in which they differ or on the contrary are very similar. 

     

    In the following table, we provide an overview of key aspects of identity in different application contexts, as well as some relevant standards. In some cases (for instance for Work and “Commerce”) we have distinguished the organisational perspective from the individual perspective is order to reflect different way the identity is managed. 

     

     

     

     

     

     

     

     

  1. Domain 

    Domain 

  1. Some Key aspects of identity (attributes) 

    Some Key aspects of identity (attributes) 

  1. Indicative Standards 

    Indicative Standards 

  1. Mobile applications (mobile phone, ambiant intelligence) 

    Mobile applications (mobile phone, ambiant intelligence) 

  1. Name, address, location, preferences,  

    Name, address, location, preferences,  

  1. CC/PP, UAProf, 

    CC/PP, UAProf, 

  1. Education (e-learning, learning networks) 

    Education (e-learning, learning networks) 

  1. Name, address, competence, Social networks 

    Name, address, competence, Social networks 

  1. IMS/LIP; LDAP (Educause) 

    IMS/LIP; LDAP (Educause) 

  1. Human Resources 

    Human Resources 

  1. Name, address, competence, psychology, sociology, social networks, roles 

    Name, address, competence, psychology, sociology, social networks, roles 

  1. HR-XML, FOAF 

    HR-XML, FOAF 

  1. Work (Organisations) 

    Work (Organisations) 

  1. Name, address, location, security, roles 

    Name, address, location, security, roles 

  1. LDAP, PKCS, etc. 

    LDAP, PKCS, etc. 

  1. Work (knowledge worker) 

    Work (knowledge worker) 

  1. Name, pseudonym, social networks, competence,  

    Name, pseudonym, social networks, competence,  

  1. FOAF 

    FOAF 

  1. Justice & police (forensic, money laundering, law enforcement) 

    Justice & police (forensic, money laundering, law enforcement) 

  1. Name, SSN, address, location, biometrics,  

    Name, SSN, address, location, biometrics,  

  1. JXDM 

    JXDM 

  1. Government (taxation, democracy/voting) 

    Government (taxation, democracy/voting) 

  1. Name, address, assets & liabilities, … 

    Name, address, assets & liabilities, … 

  1.  

     

  1. Commerce (companies) 

    Commerce (companies) 

  1. Customer information, reputation 

    Customer information, reputation 

  1. CIQ 

    CIQ 

  1. Commerce (customer) 

    Commerce (customer) 

  1. Name, address, preferences, banking information, 

    Name, address, preferences, banking information, 

  1.  

     

  1. Banking, insurance 

    Banking, insurance 

  1. Name, address, banking information, Assets & liabilities, 

    Name, address, banking information, Assets & liabilities, 

  1.  

     

  1. Personal sphere (Leisure, family) 

    Personal sphere (Leisure, family) 

  1. Name, pseudonym, address, preferences, social networks, psychology 

    Name, pseudonym, address, preferences, social networks, psychology 

  1. FOAF 

    FOAF 

  1. Health 

    Health 

  1. Name, SSN, address, Biological information 

    Name, SSN, address, Biological information 

  1.  

     

  1.  

    This table represents a very preliminary work, that should need to be consolidated in the future (using a much more rigorous methodology of classification). 

    It indicates the important overlapping of the identity from a domain to another (see the Del 2.1 for a more theoretical perspective, as well as the possible implications for the privacy of the person), but also the specificity of each application. 

    In some cases, there exists some strong similarity in the way an aspect of the identity is managed. For instance the name of the person or her address is an element that will be found in many different application domains, and will be managed in a very similar way. Other domains may have a strong overlapping in the way they represent a facet of the identity, such as for instance the management of competence in Human Resource Management or Education. 

    In some other cases, certain aspects of identity can be considered as very specific to the application domain. Sets of ad hoc and much elaborated attributes are then used to represent and capture the complexity of a particular element of the identity. For instance, in the case of mobile application (mobile phone, ambient intelligence), the location of the person represents an important dimension, and can therefore be represented with a high level of precision (this will include for example the precise and instant location of the person). In the case of commerce application, the address of the person can be represented with a high level of precision in CIQ/xNAL (information which is important for direct marketing communications). 

     

     

     

     

     

    This table represents a very preliminary work, that should need to be consolidated in the future (using a much more rigorous methodology of classification). 

    It indicates the important overlapping of the identity from a domain to another (see the Del 2.1 for a more theoretical perspective, as well as the possible implications for the privacy of the person), but also the specificity of each application. 

    In some cases, there exists some strong similarity in the way an aspect of the identity is managed. For instance the name of the person or her address is an element that will be found in many different application domains, and will be managed in a very similar way. Other domains may have a strong overlapping in the way they represent a facet of the identity, such as for instance the management of competence in Human Resource Management or Education. 

    In some other cases, certain aspects of identity can be considered as very specific to the application domain. Sets of ad hoc and much elaborated attributes are then used to represent and capture the complexity of a particular element of the identity. For instance, in the case of mobile application (mobile phone, ambient intelligence), the location of the person represents an important dimension, and can therefore be represented with a high level of precision (this will include for example the precise and instant location of the person). In the case of commerce application, the address of the person can be represented with a high level of precision in CIQ/xNAL (information which is important for direct marketing communications). 

     

     

     

     

 

The Representation of the Person in Different Application Contexts, and the Use of Standards  fidis-wp2-del2.3.models_04.sxw  A Overview of Standards for the Representation of the Person
24 / 53