This paper starts from the empirical finding that privacy principles are not rated very high in current eGovernment architectures. This is problematic because it leads to a substantial privacy erosion and undermines the existing power relations between a government and its citizens with regard to a particularly valuable asset: personal data. Precisely because of these power relations, there are very few incentives for government managers to implement Privacy-Enhanced Identity Management Systems on a large scale in an eGovernment architecture. Hereafter we introduce a less far-going alternative to Privacy-Enhanced Identity Management in eGovernment: “Privacy-Friendly Identity Management”. We conclude with a brief analysis of one important driver for government managers to choose for Privacy-Friendly Identity Management: risk management


Personal Data Data Protection Identity Management Service Orient Architecture Natural Person 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Boutonnet M. Le Principe de Prcaution en Droit de la Responsabilit Civile, Librairie Gnrale de Droit et de Jurisprudence, Paris, 2005.Google Scholar
  2. 2.
    De Bot D. Privacybescherming bij e-government in België — Een kritische analyse van het Rijksregister, de Kruispuntbank van Ondernemingen en de elektronische identiteitskaart. Vandenbroele, Brugge, 2005.Google Scholar
  3. 3.
    De Bot D. Verwerking van persoonsgegevens, Kluwer, Antwerpen, 2001.Google Scholar
  4. 4.
    Lessig L. Code version 2.0. Basic Books, New York, 2006.Google Scholar
  5. 5.
    Bauer M., Meints M., and Hansen M. Fidis Deliverable 3.1., Available at: 15 Sep 2005, last visited: 20 Aug 2006Google Scholar
  6. 6.
    Buchta A., Dumortier J., and Krasemann H. The Legal and Regulatory Framework for PRIME, in FISHER-HUEBNER S, ANDERSSON CH and HOLLEBOOM TH (eds.), PRIME D 14.1.a: Framework V1, Available at: pdf, 13 Jun 2005, last visited: 13 Jun 2005.Google Scholar
  7. 7.
    De Hert P. Titel II De Wet 8 Dec 1992 met betrekking tot de verwerking van persoonsgegevens, Apr 2005, in P. DE HERT (ed.), Privacy en Persoonsgegevens, Politeia, Brussels, 2005.Google Scholar
  8. 8.
    Deprest J. and Robben F. eGovernment: the approach of the Belgian federal administration. Available at:, Jun 2003, last visited: 20 Jun 2006Google Scholar
  9. 9.
    Deprest J. and Strickx P. eGovernment initiatives. Available at:, 26 Oct 2005, last visited: 20 Sept 2006Google Scholar
  10. 10.
    Hildebrandt M., Gutwirth S., and De Hert P. Fidis Deliverable 7.4, Implications of profiling practices on democracy and rule of law, Available at:, 5 Sep 2005, last visited: 15 Sep 2006.Google Scholar
  11. 11.
    Huyghens C.H. IDM in the risk universe, liability, methodology, standards, Available at: pdf, 20 Dec 2005. last visited: 20 Dec 2005.Google Scholar
  12. 12.
    Leenes R. and Fischer-Huebner, S. PRIME Framework version 2. Available at:, Jul 2006, last visited: 23 Aug 2006Google Scholar
  13. 13.
    Pfitzmann A. and Hansen M. Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management — A Consolidated Proposal for Terminology. Version 0.29. Available at:, Jul 2007, last visited: 31 Jul 2007Google Scholar
  14. 14.
    Robben F. eGovernment, presentation available at:, 27 Mar 2006, last visited: 1 Apr 2006.Google Scholar
  15. 15.
    Robben F. E-government in the Belgian social sector coordinated by the Crossroads Bank for Social Security, presentation available at:, 23 Jun 2006, last visited: 22 Mar 2007.Google Scholar
  16. 16.
    Slone S. Identity Management. A white paper. Available at:, Mar 2004, last visited: 11 Nov 2004Google Scholar
  17. 17.
    Weitzner D, et al. Transparency and End-to-End Accountability: Requirements for Web Privacy Policy Languages’, A position paper for the W3C Workshop on Languages for Privacy Policy Negotiation and Semantics-Driven Enforcement, available at:, Oct 2006, last visited: 17 Oct 2006.Google Scholar
  18. 18.
    Identity Management Systems (IMS). Identification and Comparison Study’, Available at:, Sep 2003, last visited: 7 Jul 2005Google Scholar
  19. 19.
    Report on Privacy Enhancing Technologies, performed for the Danish Ministry of Science and Innovation. Available at:, 28 Mar 2005, last visited: 15 Oct 2005Google Scholar
  20. 20.
    Modinis IDM Terminology Paper, Available at:, 23 Nov 2005, last visited: 22 December 2005Google Scholar
  21. 21.
    IDA Authentication Policy. Basic policy for establishing the appropriate authentication mechanisms in sectoral networks and projects, Available at:, Jul 2004, last visited: 20 Oct 2006.Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2008

Authors and Affiliations

  • Xavier Huysmans
    • 1
  1. 1.K. U. Leuven ICRILeuvenBelgium

Personalised recommendations