Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- D4.1: Structured account of approaches on interoperability.
- D4.2: Set of requirements for interoperability of Identity Management Systems.
- D4.4: Survey on Citizen's trust in ID systems and authorities.
- D4.5: A Survey on Citizen’s trust in ID systems and authorities.
- D4.6: Draft best practice guidelines.
- D4.7: Review and classification for a FIDIS identity management model.
- D4.8: Creating the method to incorporate FIDIS research for generic application.
- D4.9: An application of the management method to interoperability within e-Health.
- D4.10: Specification of a portal for interoperability of identity management systems.
- D4.11: eHealth identity management in several types of welfare states in Europe.
- Profiling.
- Forensic Implications.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
Incorporating FIDIS research into the proposed identity classification system
The FIDIS research activities, represented in the tables below, need to be incorporated into the proposed FIDIS identity classification system. The tables indicate how the research can be integrated into the best practice guidelines described in FIDIS D4.6, by applying the five principles of information management.
The vertical axis of the tables specifies the FIDIS Work Packages and the horizontal axis represents the five principles of information management, which state information streams, roles and responsibilities, proposes and procedures, enabling technologies and audit and control.
The tables provide a level of abstraction above the classification system and illustrate what it needs to cover. They may be used as a checklist for completeness.
Integration of FIDIS research activities
Work Package | ||
Ensure information is complete and accurate
Ensure systems and information are secure
Ensure statutes and regulations are complied with
Ensure all stakeholders & their representatives are bona fide
|
16 / 28 |