Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
Identity of Identity.
Interoperability.
Profiling.
Forensic Implications.
HighTechID.
Privacy and legal-social content.
D13.1: Identity and impact of privacy enhancing technologie.
D13.1 Addendum: Identity and impact of privacy enhancing technologies.
D13.3: Study on ID number policies.
D13.6 Privacy modelling and identity.
D13.7: Workshop Privacy.
D14.1: Workshop on Privacy in Business Processes.
D14.2: Study on Privacy in Business Processes by Identity Management.
D14.3: Study on the Suitability of Trusted Computing to support Privacy in Business Processes.
D14.4: Workshop on “From Data Economy to Secure.
D16.3: Towards requirements for privacy-friendly identity management in eGovernment.
Mobility and Identity.
Other.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
Table Of Content
- Executive Summary
- Privacy: A Matter of Trust?
- Trust in Enforcement of Privacy Statements
- Extending the one-sided Trust Model
- How to read this Deliverable
- Business Processes and a v
- erifiable Processing of Personal Data
- Information Flow Model of Business Processes for Personalised Services
- Use Case: Information Filtering
- Use Case: Personalised Services
- Trust Model concerning Processing of Personal Data
- Requirements for a verifiable Processing of Personal Data
- An Introduction to Trusted Computing
- Architecture of Trusted Computing by the TCG
- Key Types
- TPM Credentials
- Integrity Measurement and Reporting
- Chain of Trust
- Employment of the Trusted Computing
- Platform
- Application Areas of Trusted Computing on the Server Side
- TCP Employment on the Server Side
- Shortcomings of TCP for Supporting Privacy
- General Shortcomings for Using TCP on the Service Side
- Time Problem
- Usability Aspects
- Approaches for Using TCP as a Foundation for Policy-compliant Data Processing
- Solving the Time Problem by TCG attestated Service Access Points
- Linking of Attestation and Service Access Points
- Authentic Transport through Platform Attestation
- Linking of Service and Authentication Keys
- Integration of Authentication in the Service Session
- Discussion of the Solution Approach at Issue
- TCG Based Monitoring of uncertified Services
- Service Application as a Black Box
- Encapsulation of the Service Application
- Encapsulation by Information Flow Analysis
- Closing Evaluation of the Encapsulation
- Architecture for privacy-preserving Information Filtering
- Definitions and Requirements
- Outline of the Solution
- Main Modules and Implementation
- Controller Module
- Recommender Module
- Exemplary Filtering Techniques
- Application of Trusted Computing
- Results
- Bibliography