Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- D1.2: Communication Infrastructure.
- D1.3: Wiki System.
- D8.3: Database on Identity Management Systems and ID Law in the EU.
- D8.5: Report on inter-disciplinary workshops.
- D9.1: A Specification for FIDIS Journal.
- D9.5: 1st FIDIS in-house Journal Issue.
- D15.2: FIDIS International Summer School.
- D15.4: Interdisciplinary FIDIS Doctorial Consortium.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D8.5: Report on inter-disciplinary workshops
Content
Apart from the methodology-related achievements, the integration workshops enabled the presentation and discussion of issues, such as identity theft, trust and mobility and identity, towards the development of a common knowledge base and consensus, as well as towards the identification of knowledge and research gaps, i.e. issues that need to be addressed.
Specifically, through the presentations and discussion sessions that took place in the first workshop (“Preventing Identity Theft”), it was possible to give a definition of identity theft and also to provide technical solutions on the problem, thus assisting the integration of the diverse visions on identity theft and identity fraud. A number of technological solutions (such as RFID or Biometrics) were debated as to their potential to solve (or even soften) the problem.
In the context of the second workshop (“Identity emerging technologies and Trust”), a consensus was achieved with regard to the concept of trust: it is not only the result of a technological solution, but it involves several aspects, such as social, cultural and legal. Moreover, trust presents cognitive aspects; indeed, trust mainly is based on experience and reputation and is related to risk perception. Users need proof of trust. Also, some challenging issues to consider regarding trust where identified:
Which data for authentication has to be stored and what is the role of standards?
How to put in place efficient Trusted Third Parties and in which legal framework?
How to define clear responsibilities?
Finally, in the third workshop (“Identity challenges in a mobile world”), a consensus was reached regarding: (a) the increased requirements of mobile versus fixed identity; (b) the increased need for mobility; (c) certain identity challenges in the mobile world, and (d) that trust is actually the most important success factor for mobile services. Moreover, some knowledge gaps were identified that could provide the basis for future work, such as:
How to balance privacy and services’ costs? How to protect and enhance privacy, while providing ease of use and minimum disruption to the user?
How to securely and efficiently service “alien devices”?
How to achieve trust and standardization, especially in highly heterogeneous and mobile environments? And if there are solutions towards this direction, are they only or basically technical?
The implications of converging mobile and fixed technologies that may cater for mobile user requirements.
Denis Royer | 7 / 7 |