Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D11.1: Collection of Topics and Clusters of Mobility and Identity – Towards a Taxonomy of Mobility and Identity
Table Of Content
- Executive Summary
- Introduction
- Objectives of this Study
- Structure and Content
- Related Work: Deliverable D3.3
- Protection of Identifying Data: Personal Data and Device Characteristics
- User-friendly interface for the non-expert to prevent unintentional misuse
- Verifiable linkage between real and digital identity on the user’s device is important to prevent impersonation
- Published identifying data must be protected against misuse by peers
- Key Terms & Glossary
- Initial Scenarios for mobile Identity Management
- Introduction
- Introduction of the Scenarios and Analysis
- Scenario 1: Mobile Communication in Private Life
- Scenario 2: Mobile Craftswoman
- Summary and Conclusions
- Key Terms & Glossary
- Conceptual and sociological issues of Mobility and Identity
- Introduction
- The Concept of Identity
- Mobile Identity
- The concepts of ‘mobility’ , ‘mobile’ and ‘locational information’
- The concept ‘mobility’ in sociology
- Defining the concept of ‘mobile’ in relation to mobile technologies
- Locational information
- Mobile Identity Management
- Management of Identities
- through the use of mobile devices
- Management of Mobile Identities
- Summary and Conclusion
- Key Terms & Glossary
- Taxonomy and Data Protection Legislation
- Introduction to the European Legal Framework on Data Protection
- Data Protection Terms
- Basic Principles in Data Processing
- Fair and lawful processing
- Finality principle
- Data minimisation principle
- Data quality principle
- Conservation principle
- Data processed in line with the rights of the data subject
- Confidentiality and security
- Data transfer to countries with adequate protection
- Conclusion
- Key Terms & Glossary
- Technologies Relating to mobile
- IDM
- Anonymity and De-Identification in Mobile Networks and Mobile Identity Management
- Identification in Mobile
- Networks
- Frameworks for Identification in Mobile
- Networks
- Enabling Practical Anonymity in Mobile
- Networks
- Delegation of Rights by Identity Management
- Privacy and Delegation of Rights
- Attackers and Privacy Threats
- Privacy Criteria for Delegation of Rights
- Privacy by credential-based Identity Management
- Identity Management Systems
- Delegation of Rights and Identity Management Systems
- State of the Art Application Scenario: The PRIME LBS
- Prototype
- Conclusion and Outlook
- Key Terms & Glossary
- Conclusion and Outlook
- Index
- Bibliography