Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
Identity of Identity.
D2.1: Inventory of Topics and Clusters.
D2.2: Set of use cases and scenarios.
D2.3: Models.
D2.6: Identity in a Networked World – Use Cases and Scenarios.
D2.13: Virtual Persons and Identities.
Interoperability.
Profiling.
Forensic Implications.
HighTechID.
Privacy and legal-social content.
Mobility and Identity.
Other.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
D2.2: Set of use cases and scenarios
Conclusion
The concepts defined in this article, especially both concepts of subjects and of virtual persons, allow a better description and understanding of many identification, authentication and authorization schemes, by creating a generic model. We have seen that we can apply this model in a diversity of examples: username/password, border control, finding someone in a chatroom.
The concept of virtual persons allows a unified handling of (currently) existing and/or non-existing subjects, even if the subjects are of different types. It serves as a basis for the definitions of identity, identification and the like.
Pseudonyms become a special kind of identity. Authentication and authorization schemes become a special case of identification in our unifying model. Indeed, identification is not always linked to a subject anymore.
From a practical point of view, most identifications actually occur between virtual persons.
| 17 / 69 |
