The Future of Identity in the Information Society (eBook)
XVI, 508 Seiten
Springer Berlin (Verlag)
978-3-642-01820-6 (ISBN)
Digitising personal information is changing our ways of identifying persons and managing relations. What used to be a 'natural' identity, is now as virtual as a user account at a web portal, an email address, or a mobile phone number. It is subject to diverse forms of identity management in business, administration, and among citizens. Core question and source of conflict is who owns how much identity information of whom and who needs to place trust into which identity information to allow access to resources.
This book presents multidisciplinary answers from research, government, and industry. Research from states with different cultures on the identification of citizens and ID cards is combined towards analysis of HighTechIDs and Virtual Identities, considering privacy, mobility, profiling, forensics, and identity related crime.
'FIDIS has put Europe on the global map as a place for high quality identity management research.' -V. Reding, Commissioner, Responsible for Information Society and Media (EU)
Prof. Dr. Kai Rannenberg holds the T-Mobile Chair for Mobile Business & Multilateral Security at Goethe University Frankfurt (www.m-chair.net) since 2002. Since 2004Kai is Coordinator of the EU Network of Excellence 'Future of Identity in the Information Society' (FIDIS). Since March 2007 Kai is Cenvenor of the JTC 1/SC 27 / WG 5 'Identity management and privacy technologies'. Kai's current research interests include
- Mobile applications and Multilateral Security in e.g. M-Business, M-Commerce, M-Banking, and Location Based Services;
- Privacy and identity management, communication infrastructures and devices, such as personal security assistants and services;
- IT security evaluation and certification.
Denis Royer completed his diploma in business informatics at Braunschweig Technical University (Germany) in 2003. At the Chair for Mobile Business and Multilateral Security he was working on mobile identity management, decision support systems for the introduction of enterprise identity management systems (EIdM) process models. Currently he is an external PhD student at the Chair for Mobile Business and Multilateral Security, working for Sirrix AG in Bochum (Germany).
André Deuker received his diploma in business administration from Goethe University Frankfurt in 2007. Since autumn 2007 he has been working as a PhD student and research assistant at the T-Mobile Chair of Mobile Business & Multilateral Security. André is editor and contributor of various FIDIS deliverables.
Prof. Dr. Kai Rannenberg holds the T-Mobile Chair for Mobile Business & Multilateral Security at Goethe University Frankfurt (www.m-chair.net) since 2002. Since 2004Kai is Coordinator of the EU Network of Excellence "Future of Identity in the Information Society" (FIDIS). Since March 2007 Kai is Cenvenor of the JTC 1/SC 27 / WG 5 "Identity management and privacy technologies". Kai's current research interests include Mobile applications and Multilateral Security in e.g. M-Business, M-Commerce, M-Banking, and Location Based Services; Privacy and identity management, communication infrastructures and devices, such as personal security assistants and services; IT security evaluation and certification. Denis Royer completed his diploma in business informatics at Braunschweig Technical University (Germany) in 2003. At the Chair for Mobile Business and Multilateral Security he was working on mobile identity management, decision support systems for the introduction of enterprise identity management systems (EIdM) process models. Currently he is an external PhD student at the Chair for Mobile Business and Multilateral Security, working for Sirrix AG in Bochum (Germany). André Deuker received his diploma in business administration from Goethe University Frankfurt in 2007. Since autumn 2007 he has been working as a PhD student and research assistant at the T-Mobile Chair of Mobile Business & Multilateral Security. André is editor and contributor of various FIDIS deliverables.
Foreword 5
Acknowledgements 7
Table of Contents 8
1 Introduction 16
1.1 Identity in a Changing World 17
1.2 The Role of FIDIS 20
1.3 On This Book 21
VIGNETTE 1: PUTTING THE MACHINES IN CONTROL 27
2 Identity of Identity 32
2.1 Defining the Identity Concept 32
2.2 Conceptualisation 37
2.3 Identity of Identity Defined (Formal Conceptualisation) 48
2.4 Identity Use Cases and Scenarios 61
2.5 Making Use of the New (Web 2.0) Participatory Tools 72
2.6 Conclusion and Outlooks 74
References 75
Appendix: Table of FIDIS Web 2.0 Initiatives 79
VIGNETTE 2: VIRTUALLY LIVING IN VIRTUAL REALITIES 83
3 Virtual Persons and Identities 86
3.1 Modelling New Forms of Identities 87
3.2 Pseudonyms in the Light of Virtual Persons 96
3.3 Virtual Persons and the Law 103
3.4 Trust in the Light of Virtual Persons 108
References 128
VIGNETTE 3: USE AND ABUSE OF BIOMETRIC DATA AND SOCIAL NETWORKS 134
4 High-Tech ID and Emerging Technologies 140
4.1 Identity Management and Identity Management Systems 141
4.2 Technologies and Technical Components 144
4.3 Supporting Technologies 169
4.4 Emerging Technologies 183
4.5 Use Cases 187
4.6 Summary and Conclusions 194
References 196
VIGNETTE 4: POWERING THE PROFILE: PLUGGING INTO THE MOBILE GRID 201
5 Mobility and Identity 205
5.1 GSM – How Mobile Communication Achieved Its Special Role in Identity Management 206
5.2 Mobile Identities – Context Added 208
5.3 The FIDIS Perspectives on Mobility and Identity 212
5.4 Technological Aspects 212
5.5 Legal Aspects 225
5.6 Sociological Aspects 231
5.7 Economic Aspects 235
5.8 Requirements for Mobile Identity Management Systems 247
5.9 Outlook and Further Challenges and Questions 248
References 250
VIGNETTE 5: HUMAN ENHANCEMENT, ROBOTS, AND THE FIGHT FOR HUMAN RIGHTS 253
6 Approaching Interoperability for Identity Management Systems 255
6.1 Introduction 255
6.2 Interoperable Identity Management Systems: Definitions and Framework 257
6.3 Stakeholders Perspectives on Interoperable iDMS 264
6.4 Conclusion 275
References 275
Appendix: Experts 277
VIGNETTE 6: MORE CONTROL FOR THE MACHINES 279
7 Profiling and AmI 283
7.1 Profiling: Definitions, Applications and Risks 285
7.2 Profiling Technologies as the Enabling Technologyfor AmI 296
7.3 When Idem Meets Ipse: The Identity of the European Citizen 302
7.4 A Vision of Ambient Law 305
7.5 Conclusions 315
References 317
VIGNETTE 7: THE ROLE OF FORENSICS IN IDENTITY 321
8 Identity-Related Crime and Forensics 324
8.1 Introduction 324
8.2 Identity-Related Crime 325
8.3 Forensic Implications 338
8.4 Forensic Profiling 342
8.5 Conclusion 353
Reference 354
VIGNETTE 8: DATING 357
9 Privacy and Identity 359
9.1 Introduction 359
9.2 Privacy Aware Concepts for ID Numbers 361
9.3 Privacy Primitives and Applications 370
9.4 Privacy with Delegation of Personal Data 380
9.5 Towards Transparency 393
References 394
10 Open Challenges – Towards the (Not So Distant) Future of Identity 399
10.1 Identity Reference Architectures 399
10.2 Identity Management and Privacy 401
10.3 Identity Management and Multilateral Security 404
10.4 Identity in the Internet of Things 406
Appendix A. List of Deliverables 408
A.1 Communication Infrastructure (WP1) 408
A.2 Taxonomy: Identity of Identity (WP2) 409
A.3 HighTechID: Technologies to Support Identity and Identification (WP3) 411
A.4 Interoperability of Identity and Identification Concepts (WP4) 416
A.5 ID-Theft, Privacy and Security (WP5) 421
A.6 Forensic Implications (WP6) 424
A.7 Profiling (WP7) 425
A.8 Integration of the NoE (WP8) 429
A.9 Mobility and Identity (WP11) 430
A.10 Emerging Technologies (WP12) 432
A.11 Privacy Fundamentals (WP13) 434
A.12 Privacy in Business Processes (WP14) 437
A.13 eGovernment (WP16) 439
A.14 Abstract Persons (WP17) 439
Appendix B. Contributors 441
Appendix C. FIDIS Consortium 463
Appendix D. Proposal for a Common Identity Framework: A User-Centric Identity Metasystem 483
D.1 Introduction 483
D.2 Terminology 483
D.3 Scope 486
D.4 Metasystem Requirements in the Light of Multilateral Security 486
D.5 Abstract Model of the Identity Metasystem 491
D.6 Enabling Technologies 501
D.7 Administration 504
D.8 Standardisation 505
Glossary 507
Erscheint lt. Verlag | 29.9.2009 |
---|---|
Zusatzinfo | XVI, 508 p. |
Verlagsort | Berlin |
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Wirtschaft ► Allgemeines / Lexika | |
Schlagworte | Identity • Identity Management • Information Society • Networks • privacy • robot • service-oriented computing • Social Networks • Trust |
ISBN-10 | 3-642-01820-3 / 3642018203 |
ISBN-13 | 978-3-642-01820-6 / 9783642018206 |
Haben Sie eine Frage zum Produkt? |
Größe: 14,6 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich