Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- Privacy and legal-social content.
- D13.1: Identity and impact of privacy enhancing technologie.
- D13.1 Addendum: Identity and impact of privacy enhancing technologies.
- D13.3: Study on ID number policies.
- D13.6 Privacy modelling and identity.
- D13.7: Workshop Privacy.
- D14.1: Workshop on Privacy in Business Processes.
- D14.2: Study on Privacy in Business Processes by Identity Management.
- D14.3: Study on the Suitability of Trusted Computing to support Privacy in Business Processes.
- D14.4: Workshop on “From Data Economy to Secure.
- D16.3: Towards requirements for privacy-friendly identity management in eGovernment.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
Annex 1: Participants
The participants of the workshop are listed in the following table:
Contr. No. | Organisation | Surname | First name |
1 | JWG | Nassary Zadeh | Layla |
1 | JWG | Royer | Denis |
3 | VUB | Hildebrandt | Mireille |
4 | ICPP | Meints | Martin |
7 | KULEUVEN R&D | Huysmans | Xavier |
8 | KUB (external from PRIME) | Ribbers | Pieter |
9 | KU | Fischer-Hübner | Simone |
10 | TUB | Cissée | Richard |
10 | TUB | Wetzker | Robert |
11 | TU Dresden | Köpsell | Stefan |
12 | ALU-FR | Wohlgemuth | Sven |
13 | MU | Cvrcek | Dan |
14 | VaF | Vyskoc | Jozef |
15 | LSE | Backhouse | James |
20 | VIP | Jaquet-Chiffelle | David-Olivier |
21 | Microsoft | Bussard | Laurent |
23 | AXSIONICS | Jacomet | Marcel |
24 | SIRRIX | Alkassar | Ammar |
External | NMMU, South Africa | Botha | Reinhardt |
External | Charles Sturt University, Australia | Bowern | Michael |
External | JRC | Schumacher | Günter |
Sven Wohlgemuth | 7 / 7 |