Identity control, activity control: from trust to suspicion

نویسنده

  • Meryem Marzouki
چکیده

Processes introducing biometric identity control and communicating activity controls through data retention sign, in France and Europe, a reversal of perspective. Taking into account the legislative and regulatory transformations as well as the strategies of government and industry actors, and considering the various means of consent from the general public, we will analyze several levels of this change of paradigm: security objectives centered on intelligence rather than legal investigation; legislative and judicial proceedings oriented towards soft and contract law; intervention of private actors with prerogatives of public power; preventive rather than repressive civil or penal actions, specially through the use of technical means; sometimes inversion of the burden of the proof, requiring proving innocence rather than guilt. This results in the change from a conception of society based on mutual trust into a situation of generalized suspicion.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Service Oriented Computing

Service-oriented Architectures (SOA) facilitate the dynamic and seamless integration of services offered by different service providers which in addition can be located in different trust domains. Especially for business integration scenarios, Federated Identity Management emerged as a possibility to propagate identity information as security assertions across company borders in order to secure...

متن کامل

-

This paper focuses mainly on social aspects concerning trust and network, especially in higher education institutions. Trust plays a crucial role as social capital and is an important factor of social order, especially in countries in transition. The hypothesis that low trust is one major problem of entrepreneurship will be examined. In low-trust environments, trust is abused as soon as it is p...

متن کامل

Trust Requirements in Identity Management

Identity management refers to the process of representing and recognising entities as digital identities in computer networks. Authentication, which is an integral part of identity management, serves to verify claims about holding specific identities. Identity management is therefore fundamental to, and sometimes include, other security constructs such as authorisation and access control. Diffe...

متن کامل

Evaluation of Unified Security, Trust and Privacy Framework (UnifiedSTPF) for Federated Identity and Access Management (FIAM) Mode

Federated identity and access management systems such as Shibboleth may symbolize a boost: (i) to bring the efficiency and effectiveness in collaboration for governments, enterprises and academia, and (iii) conserve the home domain user's identity privacy in a privacy-enhanced fashion. However, the consternation is about the absence of a trusted computing based mutual trust and security es...

متن کامل

Control of Bipolaris Oryzae the Causal Agent of Rice Brown Spot Disease Via Soil Streptomyces Sp. Isolate G

Bipolaris oryzae causes rice brown spot disease which reduces rice yield with substantial global impact. Streptomycetes isolated from rice fields of Guilan Province, Iran, showed antifungal activity against the tested pathogen. From five active Streptomyces spp. isolates, isolate G showed high antagonistic activity. To determine its taxonomical identity, its colonies character...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Annales des Télécommunications

دوره 62  شماره 

صفحات  -

تاریخ انتشار 2007