Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D11.3: Economic aspects of mobility and identity
Application of the four sector model
Following this model, we generally can observe two types of communicational relationships:
inner-sector communication (only possible in those sectors that can serve as a starting point: business related, governmental and private sector) and
cross-sector communication
These will be described and mapped with commonly used descriptions of business relationships such as business to customer (b2c) and commonly used types of communication such as one-to-one or one-to-many (broadcast like) communication. In addition the resulting types of communication are described with respect to their needs for privacy and security. In cases where security is mentioned, the traditional three aspects of security are meant:
Availability (availability and in case of incidents time for the reestablishment of applications and services)
Confidentiality (data can be accessed and used by authorised persons only)
Integrity (data can be modified by authorised persons only. Especially in the context of electronic signatures, non-repudiation and authenticity of the user are important elements of integrity as well)
Privacy protection is understood in a general sense as protection of the private sphere. In addition to data protection this includes the right to be left alone, reachability management and other methods that allow for the protection of the private sphere of an individual.
7 / 37 |