Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- D4.1: Structured account of approaches on interoperability.
- D4.2: Set of requirements for interoperability of Identity Management Systems.
- D4.4: Survey on Citizen's trust in ID systems and authorities.
- D4.5: A Survey on Citizen’s trust in ID systems and authorities.
- D4.6: Draft best practice guidelines.
- D4.7: Review and classification for a FIDIS identity management model.
- D4.8: Creating the method to incorporate FIDIS research for generic application.
- D4.9: An application of the management method to interoperability within e-Health.
- D4.10: Specification of a portal for interoperability of identity management systems.
- D4.11: eHealth identity management in several types of welfare states in Europe.
- Profiling.
- Forensic Implications.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
Requirements domain
The requirements, brought together from literature reviews, EU directives and discussions with medical practitioners, are divided into two main areas: those specifying the e-Health application activities, and those specifying the management activities.
Provide health care to all citizens within and across Member states
Ensure identity management is incorporated into ICT systems within e-Health sectors
A activity of paramount importance is to ensure that the identity of the citizen, or patient, is completely secure and strictly confidential to those who are authorised to access and use this information
Provide and manage medical practitioners such as doctors, surgeons, nurses and records managers, who have been vetted for security purposes and verified for their relevant skills by their qualifications and experience
Supply and monitor funds to develop and maintain the network
Keep up-to-date the medical records of doctors, patients, biological data, etc
The requirements for management activities should specify the tools, such as project management techniques and procedures, which have to be employed to ensure that all the information, roles and responsibilities, processes and technologies are in place to manage identity issues in a secure manner. These requirements should include the management of projects, finances, human and technology resources.
5 / 14 |