Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- D4.1: Structured account of approaches on interoperability.
- D4.2: Set of requirements for interoperability of Identity Management Systems.
- D4.4: Survey on Citizen's trust in ID systems and authorities.
- D4.5: A Survey on Citizen’s trust in ID systems and authorities.
- D4.6: Draft best practice guidelines.
- D4.7: Review and classification for a FIDIS identity management model.
- D4.8: Creating the method to incorporate FIDIS research for generic application.
- D4.9: An application of the management method to interoperability within e-Health.
- D4.10: Specification of a portal for interoperability of identity management systems.
- D4.11: eHealth identity management in several types of welfare states in Europe.
- Profiling.
- Forensic Implications.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
Further description of the tables
Identity
The identity being specified in the classification system
Identifier / Credential
The identifier/credential being specified which relates to the identity
Importance
Level of importance of the identifier/credential, which may be high, medium or low; or primary or secondary, which will depend upon its application
Information held by person and other stakeholders
The identifier/credential, which is held by the person, and by other stakeholders such as an employer or government agency
Notes:
Where there may be more than one identifier/credential representing a particular attribute, such as Name or Address, they are stated as Name (n) or Address (n).
Most of the identifiers/credentials are documents that only relate to the person, which can be copied. They do not directly identify the person, as in the case of biological identifiers/credentials.
The identifiers/credentials, stakeholders, etc, stated in the tables are not exhaustive and will be extended as the work progresses.
It is envisaged that each country will have its own “names” for government departments, national ID numbers, etc.
The tables provide an overview of the five principles, applicable to most identifiers/ credentials, rather than detailed descriptions for each one.
Roles and responsibilities
The roles and responsibilities of all stakeholders such as:
Ensuring information is secure at all times
Ensuring that the practitioners managing the information are bona fide
Ensuring staff are aware of pertinent legislation and regulations
Processes and procedures
The processes and procedures of all stakeholders for managing the information, such as:
Ensuring that the identity lifecycle is managed correctly and effectively
Ensuring that the information is complete, accurate and authorised
Ensuring interoperability between stakeholders is secure, efficient and effective
Enabling technologies
Ensuring that the appropriate technologies, to support and manage, the identity information are in place, such as:
Card readers
Biometric scanners
RFID
Audit and control
To audit and control operations relating to identity management including:
The vetting of personnel
Compliance with statutes and regulations
Variances between actual and monitored information
Classification System
Stakeholder: Person Class 1: Factual / Physical / Material Attributes (Simple / Singular)
Identity | |||||
Secure and protect: Information Computer systems
Destroy out of date information
Ensure stakeholders & representatives are bona fide
Protect: Credit card usage Passwords PIN numbers
Delete unsolicited emails
Monitor regularly: Information Computer systems Vetting of personnel
Comply with statutes & regulations
| Purpose for use
Application
Lifecycle: Input Storage Access Maintenance Deletion
Accuracy
Authentication
Authorisation
Confidentiality
Security
Interoperability
Identification
Matching checks | Paper
Electronic Web
Cards: Credit (n) Store (n) Licence (n) Membership (n) Etc
Voice
Face to face
Camera (n)
Scanner (n)
RFID
PET
TET
Databases | Ensure all items are bona fide:
Person (n)
Stakeholders & their representatives
Documents and copies
Scans match with originals
Computer systems
Compliance with statutes & regulations
|
Classification System
Stakeholder: Person Class 1: (Continued)
Identity | |||||
Secure and protect: Information Computer systems
Destroy out of date information
Ensure stakeholders & representatives are bona fide
Protect: Credit card usage Passwords PIN numbers
Delete unsolicited emails
Monitor regularly: Information Computer systems Vetting of personnel
Comply with statutes & regulations
| Purpose for use
Application
Lifecycle: Input Storage Access Maintenance Deletion
Accuracy
Authentication
Authorisation
Confidentiality
Security
Interoperability
Identification
Matching checks | Paper
Electronic Web
Cards: Credit (n) Store (n) Licence (n) Membership (n) Etc
Voice
Face to face
Camera (n)
Scanner (n)
RFID
PET
TET
Databases | Ensure all items are bona fide:
Person (n)
Stakeholders & their representatives
Documents and copies
Scans match with originals
Computer systems
Compliance with statutes & regulations
|
Classification System
Stakeholder: Person Class 1: (Continued)
Identity | |||||
Secure and protect: Information Computer systems
Destroy out of date information
Ensure stakeholders & representatives are bona fide
Protect: Credit card usage Passwords PIN numbers
Delete unsolicited emails
Monitor regularly: Information Computer systems Vetting of personnel
Comply with statutes & regulations
| Purpose for use
Application
Lifecycle: Input Storage Access Maintenance Deletion
Accuracy
Authentication
Authorisation
Confidentiality
Security
Interoperability
Identification
Matching checks | Paper
Electronic Web
Cards: Credit (n) Store (n) Licence (n) Membership (n) Etc
Voice
Face to face
Camera (n)
Scanner (n)
RFID
PET
TET
Databases | Ensure all items are bona fide:
Person (n)
Stakeholders & their representatives
Documents and copies
Scans match with originals
Computer systems
Compliance with statutes & regulations
|
Classification system
Stakeholder: Person Class 2: Abstract / Interpretational Attributes (Complex)
Identity | |||||
Secure and protect: Information Computer systems
Destroy out of date information
Ensure stakeholders & representatives are bona fide
Protect: Credit card usage Passwords PIN numbers
Delete unsolicited emails
Monitor regularly: Information Computer systems Vetting of personnel
Comply with statutes & regulations
| Purpose for use
Application
Lifecycle: Input Storage Access Maintenance Deletion
Accuracy
Authentication
Authorisation
Confidentiality
Security
Interoperability
Identification
Matching checks | Paper
Electronic Web
Cards: Credit (n) Store (n) Licence (n) Membership (n) Etc
Voice
Face to face
Camera (n)
Scanner (n)
RFID
PET
TET
Databases | Ensure all items are bona fide:
Person (n)
Stakeholders & their representatives
Documents and copies
Scans match with originals
Computer systems
Compliance with statutes & regulations
|
15 / 28 |