Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
Identity of Identity.
Interoperability.
Profiling.
Forensic Implications.
HighTechID.
D3.1: Overview on IMS.
D3.2: A study on PKI and biometrics.
D3.3: Study on Mobile Identity Management.
D3.5: Workshop on ID-Documents.
D3.6: Study on ID Documents.
D3.7: A Structured Collection on RFID Literature.
D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
D3.10: Biometrics in identity management.
D3.11: Report on the Maintenance of the IMS Database.
D3.15: Report on the Maintenance of the ISM Database.
D3.17: Identity Management Systems – recent developments.
D12.1: Integrated Workshop on Emerging AmI Technologies.
D12.2: Study on Emerging AmI Technologies.
D12.3: A Holistic Privacy Framework for RFID Applications.
D12.4: Integrated Workshop on Emerging AmI.
D12.5: Use cases and scenarios of emerging technologies.
D12.6: A Study on ICT Implants.
D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
D12.10: Normality Mining: Results from a Tracking Study.
Privacy and legal-social content.
Mobility and Identity.
Other.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication
List of Tables
Table 1: ISO/OSI reference model 7
Table 2: Internet reference (TCP/IP) model 7
Table 3: HTTP fields which contain personal data 11
Table 4: Sample SMTP conversation between e-mail client and server 14
Table 5: Fields of a DNS query 18
Table 6: TCP header 24
Table 7: UDP packet structure 27
Table 8: SCTP packet structure 29
Table 9: IP packet structure 32
Table 10: IPv6 packet structure 34
Table 11: Ethernet frame (IEEE 803.2 / 802.2) 39
Table 12: PPP frame as defined in RFC 1662 41
Table 13: IEEE 802.11 MAC frame format 44
Table 14: 802.11 physical frame for FHSS modulation 44
Table 15: The most important security protocols for 802.11 WLANs 46
Table 16: ISDN general LAPD frame format 47
Table 17: ISDN layer 3 frame format 48
Table 18: Bluetooth packet format at the Link Layer 50
Table 19: Categorisation of privacy policy languages (based on Kumaraguru et al. 2007) 73
Table 20: Exemplary categorisation of privacy policies (based on Madsen et al. 2006) 78
| schulte | 29 / 30 |
