You are here: Resources > FIDIS Deliverables > HighTechID > D3.1: Overview on IMS > 

D3.1: Overview on IMS

Introduction  Title: Overview on IMS
STRUCTURE FOR THE DATABASE
 Structuring Identity Management Systems from the Product View

 

Structure for the Database

 

Attribute Label 

Definition 

Values 

Name 

Name of the IMS 

Text 

Version number 

Version of IMS 

Text 

Manufacturer / distributor 

Main manufacturer or provider of the IMS 

Text 

Nature of provider / distributor 

Description of the nature of the provider of the system. (e.g. public, private, regional, national, international) 

Text 

Nation 

Nation of the manufacturer’s resp. of provider’s location 

Text 

Geographical scope 

 

Enumerated: National, European, International 

Supported languages 

 

Text 

State of development 

Statement whether the IMS is an available product or a service on the market (Available), still a Prototype, a Suspended prototype, or just a Concept.  

Enumerated: Available, Prototype, Suspended prototype, Concept 

Type of IMS 

1: Access Management System; 2: Profiling System; 3: IMS for user-controlled context-dependent role and pseudonym management

Enumerated: see left 

Class of IMS 

Class 1, 2 or 3 as per definition of types outlined in section 1 

Enumerated: type 1, 2 or 3 

Closed/open IMS 

“Closed IMS” means that the scope of the managed identities is restricted to the IMS context. “Open IMS” means that the managed identities work with several systems or applications.  

Enumerated: Closed, Open 

Main functionality 

Short description (e.g. form fill-in, single sign-on, etc.) 

 

Technical requirement 

Description of the hardware, software, operating system and services the IMS requires 

Text 

Price 

Price of the IMS 

Integer / Text 

Installation base of the IMS 

Number of users of the IMS / Penetration of market 

Integer / Text  

Interoperability / standards 

Description if the IMS can be used with other applications and systems. This could be achieved by using standards like protocols for communication. 

Text 

Seals etc. 

Description of seals and other awards, etc. 

Text 

Server-side component(s) 

Description of the server-side-components (data storage and processing) 

Text 

Control of the server-side data by the user 

Description of methods (e.g. encryption), how the control of the user over his identity related data is established with respect to availability, integrity and confidentiality 

Text 

Client-side component(s) 

Description of the client-side-components (data storage and processing) 

Text 

Support by third parties 

Description of which third party or intermediary support is integrated, e.g., certificate providers, IMS providers, delivery services, payment services, … 

Boolean (yes/no) 

+ text 

References 

Sources of information, literature, links etc. 

Text 

 

 

Attribute Label 

Definition 

Values 

Description of functionality / features (client and server) 

What are the characteristics / specialities? Handling of identities? Use of pseudonyms / roles? Support of anonymity? Use of electronic signatures / PKI? Storage of data? Handling of accounts? Password management? Security / encryption, etc.? Data protection? Privacy Enhancing Technologies? Data minimisation? Support of law enforcement? Usability? […]  

Long free text 

Screenshot 

One screenshot 

Picture 

Flow chart 

Shows how data is processed within the IMS, which parts are involved. 

Picture 

Evaluators 

Name(s) and organisation(s) of the evaluator(s) 

Text 

Date of contribution 

Date(s) of the evaluation of the IMS and of the contribution 

Date 

Table : Suggested structure of the database on IMS

 

 

Introduction  fidis-wp3-del3.1.overview_on_IMS.final_04.sxw  Structuring Identity Management Systems from the Product View
9 / 31