Starting points are formed by identity management, schemes, policies and practices that we know from the concept of Public Key Infrastructure (PKI) and the electronic signature. But also the developments that are occurring in the field of outsourcing and cloud services. From these frameworks, the shift in the management paradigm can be applied: the data subject is “in control” over his or her own personal data, and new schemes and architectures are created. This is being experimented with in various forums. Now that the GDPR has been adopted, the architectures can be drawn to the desired maturity level.
Participants in this course are presented with the principles and architectures. Architectures that have led to applications are shown and discussed where available.