R2: Privacy and Control

[Work done from 9th June to 22nd June 2008]

As I mentioned in my earlier report, after the submitting the SRS document the entire group members held two meeting to decide how we shall proceed with this project work. In that meeting we noted down few things which were related to the physical Structure of the eID, and how we are going to achieve the Infrastructural Requirements. And we considered some way to handle the Privacy Issues. They are classified here.

  • Users should have the control over the information they share with each and other services.
  • If there are any services where abuses can happen, then we will implement a system which prompts the user to accept for an end-user agreement, which lets the service provider or the main authority to track some data to identify the people only when there is a misuse.
  • Implement the privacy-enhancing tools in the eID infrastructure to disassociate different sectors where the user is active.

And we also found we need to understand the web services and the Architecture of the web services with the cryptography world. Still I’m browsing the internet to find research papers and eBooks about web Services.

Kanaganayagham Shayanthan – alias Shayanth

Filed under Reports