Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- D4.1: Structured account of approaches on interoperability.
- D4.2: Set of requirements for interoperability of Identity Management Systems.
- D4.4: Survey on Citizen's trust in ID systems and authorities.
- D4.5: A Survey on Citizen’s trust in ID systems and authorities.
- D4.6: Draft best practice guidelines.
- D4.7: Review and classification for a FIDIS identity management model.
- D4.8: Creating the method to incorporate FIDIS research for generic application.
- D4.9: An application of the management method to interoperability within e-Health.
- D4.10: Specification of a portal for interoperability of identity management systems.
- D4.11: eHealth identity management in several types of welfare states in Europe.
- Profiling.
- Forensic Implications.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
A stakeholder model for e-Government is shown in Figure 5, which might represent a “typical” structure of government. The government policies are determined by parliament and performed by the various departments and agencies. The proposed European Interoperability Framework is to “support the EU’s strategy of providing user-centred eServices by facilitating the interoperability of services and systems between public administrations, as well as between administrations and the public (citizens and enterprises), at a pan-European level”.
Figure 5: Typical stakeholders within Government sector
Figure 5: Typical stakeholders within Government sector
4.2.3 Information management principles for e-Government are shown below in Table 4
Identity | |||||
Secure and protect: Information Computer systems
Destroy out of date information
Ensure stakeholders & representatives are bona fide
Protect: Credit card usage Passwords PIN numbers
Delete unsolicited emails
Monitor regularly: Information Computer systems Vetting of personnel
Comply with statutes & regulations
| Purpose for use
Application
Lifecycle: Input Storage Access Maintenance Deletion
Accuracy
Authentication
Authorisation
Confidentiality
Security
Interoperability
Identification
Matching checks | Paper
Electronic Web
Cards: Credit (n) Store (n) Licence (n) Membership (n) Etc
Voice
Face to face
Camera (n)
Scanner (n)
RFID
PET
TET
Databases | Ensure all items are bona fide:
Person (n)
Stakeholders & their representatives
Documents and copies
Scans match with originals
Computer systems
Compliance with statutes & regulations
|
Table 4
Table 4
4.3 e-Health
It is envisaged that the proposed FIDIS interoperability framework will be suitable for performing the applications discussed in the report “Connected Health – Quality and safety for European Citizens” which was published by the European Commission.
It is envisaged that the proposed FIDIS interoperability framework will be suitable for performing the applications discussed in the report “Connected Health – Quality and safety for European Citizens” which was published by the European Commission.
4.3.1
3 / 6 |