Identity management of e-ID, privacy and security in Europe. A human rights view
نویسنده
چکیده
With privacy enhancing identity management, end users are given better ways for managing their identities for specific contexts. One could easily argue that the need to implement identity management systems that are privacy enhancing follows from the EU data protection regulation. One of the challenges while developing privacy enhancing identity management is getting governments to become genuinely interested, both in their capacity of data processing organisation and legislator or policy maker. Another challenge, this time for the private sector, is to find the right balance between data protection perfection and simplicity or users’ convenience, while developing privacy enhancing identity management systems. After a brief discussion of these challenges we discuss the growing human rights recognition of the value of digital identity and its management. In particular, the German constitutional court seems to pave the way for a basic right to have digital identity protected and secured. a 2008 Elsevier Ltd. All rights reserved. 1. General and a new personality if you wish. Often we do not. In order Privacy is generally associated with the protection of the integrity, autonomy and private life of the individual. Basically, it’s about people’s right to choose how they want to live their life, and what things they want to keep private. Do we have a choice when interacting online? Often we do. The emergence of the Internet has allowed more and more people to discover certain aspects of identity formation hitherto unknown. Online worlds let you create a character, a home agement in e-society’, p ical and Policy Implicatio ship and the Israeli Cent Identity Management’, I identity management for ntität – die europäische P 531–532. er Ltd. All rights reserved to obtain certain goods or services we are required to identify ourselves in ways beyond our control. Identity management (IDM) is commonly referred to as the set of processes and tools that serve to establish the identity of a user (e.g. enrol an employee, customer, contractor) in a system. Today a trend towards user-centricity and privacy enhancing identity management is noticeable, with the EU funding research initiatives such as Prime enabling more user control. User-centricity distinguishes itself from other aper presented at NATO Advanced Research Workshop (ARW) on ns of Automated Systems for Human Identification (Ait) organised er for the Study of Bioterrorism in Jerusalem, September 2–4, 2006 PTS reports, 2002, vol. 67 (http://www.jrc.es/home/report/english/ everyone,’ ACM, 2005, p. 20–27. For a more comprehensive overerspektive. Übersicht über aktuelle EU-Projekte’, DuD – Datenschutz
منابع مشابه
Secure & privacy-preserving eID systems with Attribute-based credentials
National electronic identification (eID) systems aim to provide universal, unique and reliable identification and authentication mechanisms to the citizens. Many countries in Europe have already introduced or are about to introduce electronic ID cards to their citizens. The increasing number of eID infrastructures and initiatives have been taken to scale the eID systems to support both eGovernm...
متن کاملPrivacy and Security of Big Data in THE Cloud
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
متن کاملSecurity and Privacy Perceptions of E- ID: A Grounded Research
This paper reports on research in progress that explores the perceptions of security and privacy of UK citizens regarding electronic identity cards. In the wake of the UK National Identity Scheme proposals and with the introduction of electronic identity cards in the coming years, it is important to understand the perspectives of UK citizens. The Scheme sparked furious public debate, but as yet...
متن کاملPrivacy and Security of Big Data in THE Cloud
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
متن کاملMacroeconomics of Privacy and Security for Identity Management and Surveillance
Purpose – The purpose of this paper is to develop an approach for investigating the impact of surveillance technologies used to facilitate security and its effect upon privacy. Design/methodology/approach – The authors develop a methodology by drawing on an isomorphy of concepts from the discipline of Macroeconomics. This proposal is achieved by considering security and privacy as economic good...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Inf. Sec. Techn. Report
دوره 13 شماره
صفحات -
تاریخ انتشار 2008