Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- Privacy and legal-social content.
- D13.1: Identity and impact of privacy enhancing technologie.
- D13.1 Addendum: Identity and impact of privacy enhancing technologies.
- D13.3: Study on ID number policies.
- D13.6 Privacy modelling and identity.
- D13.7: Workshop Privacy.
- D14.1: Workshop on Privacy in Business Processes.
- D14.2: Study on Privacy in Business Processes by Identity Management.
- D14.3: Study on the Suitability of Trusted Computing to support Privacy in Business Processes.
- D14.4: Workshop on “From Data Economy to Secure.
- D16.3: Towards requirements for privacy-friendly identity management in eGovernment.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
Structure and Content
This study is organised in four parts:
Part 1: Privacy threats in business processes with personalised services
Part 2: Privacy-aware business process design and identity management
Part 3: Approaches for identity management extensions for business processes
Part 4: Conclusion and outlook
Part one introduces two scenarios for business processes with personalised services: single-stage business processes and multi-stage business processes, with service providers acting on behalf of their customers. The aim of part two is to derive security requirements for identity management which preserve customer’s privacy with regard to his informational self-determination, i.e. a customer is able to decide on the disclosure and use of his personal data. Furthermore, part two investigates on process models for inventing privacy in business processes and on the current security mechanism for private data: identity management. Current user-centric identity management systems classified concerning the trust model are considered and applied on both types of business processes. Part three presents two approaches for identity management which partially fills this gap by a credential-based usage control mechanism and a transparency instrument for customers in order to retrace their data disclosure and profiles at service providers. Part four concludes this document and gives an outlook to further work, in order to verify the trustworthiness of the participating service providers and certification authorities.
4 / 38 |