FIDIS
Future of Identity in the Information Society (No. 507512)
D2.3
[Final], Version: 2.0
File: fidis-wp2-del2.3.models.doc
Page 44
References
Andre, E., Klesen, M., Gebhard, O., Rist, T.,. (2000); “‘Exploiting Models of Personality and Emotions to
Control the Behavior of Animated Interactive Agents’”; Fourth International Conference on Autonomous
Agents, pp. 3-7, Barcelona.
Baecker, D., (1999); “Organisation als System“; Suhrkamp, Frankfurt am Main 1999.
Brusilovsky, P., (2001); “Adaptive Hypermedia, User Modeling and User-Adapted Interaction”; Kluwer
Academic Publishers, Printed in the Netherlands, pp. 87-110
Diogene (2002); “Survey on Methods and Standards for Student Modelling”; Diogene project, September 2002.
http://www.diogene.org/archive.html
Fink, J., Kobsa, A., (2000); “A Review and Analysis of Commercial User Modeling Servers for Personalization
on the World Wide Web”; in User Modeling
and User Adapted Interaction, Special Issue on Deployed User
Modeling, 10, p.204-209
[Fischer, 2001]
Fischer G. (2001); “User Modeling in Human-Computer Interaction”; in User Modeling and User Adaptive
Interaction, Kluwer Academic Publishers, Printed in Netherlands, 2001. p.69-85
Kay, J, (2000); “User modeling for adaptation”; in User Interfaces for All; Stephanidis (ed), C, Salvendy, G,
(General Editor), Human Factors Series, Lawrence Erlbaum Associates, 271—294.
Kesterling, A., (2000); “Kommunikation unter Anwesenden – Studien über Interaktionssysteme“; Frankfurt am
Main.
Kobsa, A., Koenemann, J., and Pohl, W., (2000); “Personalized hypermedia presentation techniques for
improving online customer relationships”; The Knowledge Engineering Review 16, p111-155
Luhmann, N., (1991); “Die Form ‘Person’“; in Soziale Welt; 42 (2), p. 167-175.
Luhmann, N., (1997); “Die Gesellschaft der Gesellschaft“; Suhrkamp, Frankfurt am Main.
Luhmann, N., (2000); „Organisation und Entscheidung“; 1st Edition; Westdeutscher Verlag,
Opladen/Wiesbaden.
Mountain, D., and Raper, J., (2000); “Designing geolocation services for next generation mobile phone
systems”; the AGI (association for geographic information) conference at GIS 2000.
Nabeth, T., Angehrn, A.A. and R. Balakrishnan (2004); “Integrating ‘Context’ in e-Learning Systems Design”;
IEEE International Conference on Advanced Learning Technologies (ICALT 2004), Joensuu, Finland
Razmerita, L., 2004; “User modeling and personalization of the Knowledge Management Systems”; book
chapter in Adaptable and Adaptive Hypermedia, edited by Sherry Chen and George Magoulas, published by Idea
Group Publishing.
Stephanidis, C., (2001); “Adaptive Techniques for Universal Access”; User Modeling and User-Adapted
Interaction 11: 159-179, Kluwer Academic Publishers
See also:
The Fidis Wiki (restricted access).
http://internal.fidis.net/178.0.html?tx_a1wiki_pi1[keyword]=t2.1%20definition
The FIDIS WP2 collection of identity resources at:
http://www.calt.insead.edu/fidis/information/news/
FIDIS
Future of Identity in the Information Society (No. 507512)
D2.3
[Final], Version: 2.0
File: fidis-wp2-del2.3.models.doc
Page 45
6 Annexes: An Overview of Standards for Representing
Person’s Information
This Annexe provides some brief descriptions of some of the identity schema standards for
representing user information in different domains. They are aimed at giving the reader some
global overview on the categories of attributes manipulated in the different standards, without
this having reader to go into the full specifications. The full specifications, to which this
document provides references, should be used in the case the reader would like to engage into
elaborated work.
6.1 Directories and Business Cards (LDAP, vCards, Active
Directory, Liberty Alliance schemas, PKCS, etc.)
Directory services provide the means to manage the identities and relationships that make up
network environments. Directory services can for instance
be used to manage the email
addresses, but also to manage the permission and the access to resources. The objects that are
stored in directories can include people, but also organisational structures and resources.
6.1.1 LDAP schema
6.1.1.1
Presentation
The Lightweight Directory Access Protocol (LDAP) is a protocol for accessing directory
services, which can be seen as specialised databases, e.g. over the internet. It replaces its
predecessor, the Directory Access Protocol (DAP), which has not become widely accepted
due to its complexity. Version v3 of the LDAP is specified in RFC3377. A main feature of the
LDAP is its focus on security aspects, it provides AAA (authentication, authorisation and
accounting) functionality to secure the information within directory services by supporting
encryption between the client and the directory server, and by providing access control lists
(ACLs) defining who may access specific directory entries or parts thereof.
An LDAP directory contains entries in a hierarchical structure. A directory entry may refer to
any kind of entity, object, or resource. Each entry is identified by a distinguished name (dn),
and consists of one or more attributes, i.e. type-value pairs. A directory schema specifies a set
of rules defining what may be stored in a directory, the valid attribute types etc.
Table 1 shows an example of a LDAP directory entry representing a person. The attribute
types used in the example are commonly used and therefore given as short keyword names.
The Distinguished Name of the entry, containing in this case the
person’s Common Name (cn), Organisation (o) and Country (c)
cn=Richard Cissee,
o=DAI-Labor,
c=Germany
Email address attribute.
mail=richard.cissee@dai-labor.de
LocalityName attribute, typically the city.
l=Berlin
Table 1: An Exemplary LDAP Directory Entry