identity

Emphasis on cloud computing, eGovernment, citizen and national e-identities, open identity initatives, law, policy, standards-based identity infrastructures, and secure information sharing and collaboration.

March, 2010

  • An introduction to Microsoft's U-Prove technology (2010)

    The U-Prove technology provides enhanced security of identity-related information as it travels online by enabling minimal disclosure capabilities for all parties involved in electronic transactions and communications.
  • An introduction to Open Identity Trust Framework Models (2010)

    Today many online interactions require you to disclose identity information. This poses substantial trust challenges, both for the people who disclose the information and for those who receive it. Until now, this problem has been addressed by a simplistic...
  • An introduction to Cloud Computing in Government-US (2010)

    The integration of software and assets you own with software and services in the cloud gives government new choices for balancing system management, cost, and security while helping to improve citizen services. Federal, state, and local governments...
  • An Introduction to the Windows Identity Foundation for Developers (2009)

    The goal of this whitepaper is to help developers get started building claims-aware applications using Windows Identity Foundation. This paper introduces concepts and terminology to help developers understand the benefits and concepts behind the claims...
  • A Microsoft Perspective on Privacy in the Cloud Computing Era (2009)

    Cloud computing raises a number of important policy questions concerning how people, organisations, and governments handle information and interactions in this environment. However, with regard to most data privacy questions as well as the perspective...
  • The Architect Journal-Identity and Access (2009)

    In this issue, we invite you to think about the identity architecture in your organization. Identity management today is evolving from the single, isolated scenario to a federated one, in ways which may surprise you; a comprehensive look at the evolving...
  • An Introduction to Information Cards and Identity Selectors (2006-2009)

    Contains the open specifications, icons and guides for information cards and identity selectors, including Windows CardSpace.
  • A Microsoft Perspective on Online Identity Theft (2008)

    Identity theft threatens the growth of e-commerce and the provision of financial and government services online. The issue requires a more comprehensive approach to protecting personal information, including consumer education, new technology tools, responsible...
  • Establishing End to End Trust (2008)

    Creating a safer, more trusted Internet - It is not an overstatement to say that the Internet has transformed the way we live. Social networking represents the new town square; blogging has turned citizens into journalists, and e-commerce sites have spurred...
  • A User-centric Identity Metasystem (2008)

    This paper proposes a framework for protecting privacy and avoiding the unnecessary propagation of identity information while facilitating exchange of specific information needed by Internet systems to personalize and control access to services. It also...
  • A Privacy-compliant Identity Metasystem (2006)

    Just as individual identity is fundamental to our face-to-face interactions, digital identity is fundamental to our interactions in the online world. Unfortunately, many of the challenges associated with the Internet stem from the lack of widely deployed...
  • Microsoft's Vision for an Identity Metasystem (2005)

    This paper introduces the principles behind this approach in "The Laws of Identity"; it presents an open and interoperable architecture for building the metasystem, and it describes Microsoft's plans to participate in the identity metasystem.
  • Trust in the Information Society

    Members of the team participated as panelists in the Trust in the Information Society conference in Leon, Spain (February 10-11, 2010). One of the sessions focused on identity as a collaborative foundation , by Microsoft’s distinguished engineer, Kim...
  • The Laws of Identity (2005)

    This paper is about how we can prevent that loss of trust and go forward to give Internet users a deep sense of safety, privacy and certainty about who they are relating to in cyberspace. Nothing could be more essential if new Web-based services and applications are to continue to move beyond “cyber publication” and encompass all kinds of interaction and services. Our approach has been to develop a formal understanding of the dynamics causing digital identity systems to succeed or fail in various contexts, expressed as the Laws of Identity. Taken together, these laws define a unifying identity metasystem that can offer the Internet the identity layer it so obviously requires.
  • Top 5 security and privacy challenges in identity infrastructures – and how to overcome them with U-Prove

    Commercial businesses and governments are rolling out identity systems to improve their security and to provide online access to services. Current identity framework efforts (including federated identity protocols such as SAML and OpenID) do not provide...
  • Open Identity Trust Framework Model (Whitepaper)

    Today many online interactions require you to disclose identity information. This poses substantial trust challenges, both for the people who disclose the information and for those who receive it. Until now, this problem has been addressed by a simplistic...
  • Microsoft releases U-Prove technology

    Today, we took a first step to make the Microsoft U-Prove technology available! First, core portions of the U-Prove intellectual property via a cryptographic specification (under the Microsoft Open Specification Promise ) are available to any interested...