Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
Identity of Identity.
Interoperability.
Profiling.
Forensic Implications.
HighTechID.
Privacy and legal-social content.
D13.1: Identity and impact of privacy enhancing technologie.
D13.1 Addendum: Identity and impact of privacy enhancing technologies.
D13.3: Study on ID number policies.
D13.6 Privacy modelling and identity.
D13.7: Workshop Privacy.
D14.1: Workshop on Privacy in Business Processes.
D14.2: Study on Privacy in Business Processes by Identity Management.
D14.3: Study on the Suitability of Trusted Computing to support Privacy in Business Processes.
D14.4: Workshop on “From Data Economy to Secure.
D16.3: Towards requirements for privacy-friendly identity management in eGovernment.
Mobility and Identity.
Other.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
Table Of Content
- Executive Summary
- Introduction
- Information Chains in Personalised Business Processes
- Personalised Services
- Communication Relationships in Business Processes
- Single-stage Business Processes: Collecting Customer’s Data
- Multi-stage Business Processes: Using Customer’s Data
- Hurdles for the Acceptance of Personalised Services
- Case Study: Loyalty Program
- Case Study: Intelligent Software-Agents
- Conclusion
- Privacy and Data Protection in Business Processes
- Privacy Aspects
- Personalised Profiles and the Need for ‘Ambient Law’
- Effects of Intelligent Personalisation
- Data Minimisation and the Vision of AmI
- Data Maximisation and Personal Autonomy
- The Need for a Vision of
- ‘Ambient Law’
- Conclusion: The Design of Technologically Embodied Law
- Privacy and Security Threats
- Use of Personal Data
- Collection of Personal Data
- Processing of Collected Personal Data
- Storage of Collected Personal Data
- Delegation of Collected Personal Data
- Intrusion into the Customer’s System
- Threats to the Security of Service Providers
- Case Study: Using Attributes as Access Rights in eGovernment
- Case Study: Privacy Threats in a Loyalty Program
- Case-Study: Privacy Threats of Intelligent Software Agents
- Conclusion
- Privacy-aware Business Process Design and Identity Management
- Privacy-aware Business Process Design by an Enterprise Privacy Architecture
- Compliance in Enterprises – How can Trends in IT-Security be transferred to Data Protection?
- Requirements for Data Protection Management
- Forerunner Process Models for DPM
- The DPM Process Model
- Summary and Outlook
- Business Processes and Identity Management
- Single-Sign On with One Identity Provider:
- on Multi-Stage Business Processes
- Single-Sign On with Several Identity Providers:
- :
- satio
- n
- Identity Management with Partial Identities:
- on Multi-Stage Business Processes
- Anonymous Credentials:
- System
- on Multi-Stage Business Processes
- Security Requirements for Identity Management in Business Processes
- Conclusion
- Approaches for Identity Management Extensions for Business Processes
- Unlinkable Delegation of Rights by DREISAM
- Model of Usage Control for Privacy in Multi-stage Business Processes
- satio
- n in the Form of a Proxy Credential
- Phases of a Delegation and a Revocation of an Authori
- satio
- n
- satio
- n
- satio
- n
- Delegation of an Authori
- satio
- n
- satio
- n
- Revocation of an Authori
- satio
- n for Delegated Data
- Security Properties of
- Applying
- on Loyalty Program with Delegation of Rights on Customer’s Data
- Conclusion
- ‘Data Track’ for Increasing Transparency for End Users
- Legal Background
- Logging Functionality
- Search Functionality
- Support for “Worried Users”
- Online Functions for Exercising Rights
- Conclusion
- Conclusion and Outlook
- References