Publications
Chosen filters:
Chosen filters:
User-centric privacy enhancing Identity Management KU Leuven
Online identities are associated to individuals and improper handling of these identities may therefore affect these individuals. Placing the individual at the center of identity management and empowering them with tools to actively manage their identity may help limit the privacy risks provoked by the information society. As we have argued in the previous chapters, embedding privacy into the design of identity management systems is important. ...
Identity management of e-ID, privacy and security in Europe. A human rights view Vrije Universiteit Brussel
With privacy enhancing identity management, end users are given better ways for managing their identities for specific contexts. One could easily argue that the need to implement identity management systems that are privacy enhancing follows from the EU data protection regulation. One of the challenges while developing privacy enhancing identity management is getting governments to become genuinely interested, both in their capacity of data ...
The need for privacy-enhancing Identity Management KU Leuven
The previous chapter described current developments in identity management. Identity management systems are moving away from enterprise centric 'silo' systems towards federated and user-centric systems. The traditional single enterprise solutions with their identity data 'silo's' are becoming obsolete because of the collaboration between service providers and because they are burdensome for both the individual and for organisations. Current ...
A smart card based solution for user-centric identity management KU Leuven
Many electronic identity solutions are currently available. Examples are governmental identity cards and federated identity management solutions. However, many proposed systems either lack scalability, flexibility or present weak privacy properties. This paper proposes a smart card based solution that realizes strong privacy features while retaining the scalability and flexibility of federated identity management implementations like Shibboleth.
Towards a Cross-Context Identity Management Framework in E-Health KU Leuven
Purpose - Modern e-health systems incorporate different healthcare providers in one system and provide an electronic platform to share medical information efficiently. In cross-context communications between healthcare providers, the same information can be interpreted as different types or values, so that one patient will be issued different identifiers by different healthcare providers. This paper aims to provide a solution to ensure ...
User-centric identity management using trusted modules KU Leuven
Many service providers want to control access to their services and offer personalized services. This implies that the service provider requests (and stores) personal attributes. However, many service providers are not sure about the correctness of attributes that are disclosed by the user during registration. Federated identity management systems aim at increasing the user-friendliness of authentication procedures, while at the same time ...
User-centric identity management using trusted modules KU Leuven
Many service providers want to control access to their services and offer personalized services. This implies that the service provider requests and stores personal attributes. However, many service providers are not sure about the correctness of attributes that are disclosed by the user during registration. Federated identity management systems aim at increasing the user-friendliness of authentication procedures, while at the same time ensuring ...
Ethnicity, Race, and National Identity in Management and Organization Studies Hasselt University
This chapter critically assesses Management and Organization Studies (MOS) approaches to the topics of ethnic, racial, and national identity. It discusses how MOS has ignored ethnicity, race, and national identity or depoliticized these issues by conceptualizing them as "natural" and disconnected from processes of power and inequality. The chapter introduces alternative perspectives in MOS that address ethnicity, race, and national identity as ...
Data Privatizer for Biometric Applications and Online Identity Management KU Leuven
Biometric data embeds information about the user which enables transparent and frictionless authentication. Despite being a more reliable alternative to traditional knowledge-based mechanisms, sharing the biometric template with third-parties raises privacy concerns for the user. Recent research has shown how biometric traces can be used to infer sensitive attributes like medical conditions or soft biometrics, e.g. age and gender. In this work, ...