Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- D1.2: Communication Infrastructure.
- D1.3: Wiki System.
- D8.3: Database on Identity Management Systems and ID Law in the EU.
- D8.5: Report on inter-disciplinary workshops.
- D9.1: A Specification for FIDIS Journal.
- D9.5: 1st FIDIS in-house Journal Issue.
- D15.2: FIDIS International Summer School.
- D15.4: Interdisciplinary FIDIS Doctorial Consortium.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
General Attributes
The general attributes describe the basic information of an IMS by a first set, which allows the IMS to be identified and by a second one dealing with the platform and the environment.
Evaluation of IMS
This section covers the basic details about the evaluation, i.e. the entry of the IMS in question into the database.
The general attributes describe the basic information of an IMS by a first set, which allows the IMS to be identified and by a second one dealing with the platform and the environment.
Attribute Label | Definition | Values |
Evaluators | Name(s) of the evaluator(s) | Text |
Evaluators’ Organisation | Organisation(s) of the evaluator(s) | Text |
Date of contribution | Date(s) of the evaluation of the IMS and of the contribution | Date |
Identification of IMS
This section of the database is for the purpose of providing a general overview. Users can search by name, by provider, by country or by state of development.
Attribute Label | Definition | Values |
Name | Name of the IMS | Text |
Version number | Version of IMS | Text |
Manufacturer | Main manufacturer or provider of the IMS | Text |
Nation | Nation of the manufacturer’s location | Text |
References | Sources of information, links, etc. and the IMS version number to which references refer, if possible avoiding ‘marketing information’. | Text (including hyperlinks) |
Supported languages |
| Possible values (more than one can be selected): Czech, Danish, Dutch, English, Estonian, Finnish, French, German, Greek, Hungarian, Italian, Latvian, Lithuanian, Maltese, Polish, Portuguese, Slovak, Slovene, Spanish, Swedish |
Closed/Open IMS | “Closed IMS” means that the scope of the identities is restricted to the IMS context. “Open IMS” means that the identities work with several systems or applications outside the IMS. | Enumerated: Closed, Open |
State of deployment | Statement whether the IMS is an available product or a service on the market (Available) or if it is a Prototype, a Suspended prototype, or just a Concept. | Enumerated: Available, Prototype, Suspended prototype, Concept |
Geographical scope | Regions where the IMS is available | Enumerated: National, European, Global |
Platform and environment
Attribute Label | Definition | Values |
Hardware / software requirement | Description of the hardware, software, operating system and services the IMS requires | Text |
Installation base IMS | Number of users of the IMS | Text |
Interoperability / standards | Description if the IMS can be used with other applications and systems. This could be achieved by using standards like protocols for communication. This field will include the standards that the IMS adheres to, e.g. Liberty Alliance | Text |
Server-side component(s) | Description of the server-side-components (data-storage and processing) | Text |
Client-side component(s) | Description of the client-side-components (data-storage and processing) | Text |
Description of Methods | Description of methods (e.g. encryption), how the control of the user over his identity-related data is established with respect to availability, integrity and confidentiality. | Text |
Description of functionality / features (client and server) | What is the characteristic / speciality? Handling of identities? Use of pseudonyms / roles? Support of anonymity? Use of electronic signatures / PKI? Storage of data? Handling of accounts? Password management? Security / encryption, etc.? Data protection? Privacy Enhancing Technologies? Data minimisation? Support of law enforcement? Usability? […] | Text |
Seals | Privacy and other seals that certify that the IMS applies to law. | Boolean: yes / no + text |
Support by third parties | Description of which third party or intermediary support is integrated, e.g., certificate providers, IMS providers, delivery services, payment services, … | Boolean (yes/no) + text |
Nature of provider / distributor | Description of the nature of the provider of the system. (e.g. public, private, regional, national, international) | Text |
Flow chart | Shows how data is processed within the IMS, which parts are involved. | Picture |
Screenshot | One screenshot | Picture |
Cost
Attribute Label | Definition | Values |
Purchase/Licence | Purchase cost in EUR | Real |
Purchase cost comment | Any additional information on the field above | Text |
11 / 53 |