Emphasis on cloud computing, eGovernment, citizen and national e-identities, open identity initatives, law, policy, standards-based identity infrastructures, and secure information sharing and collaboration.

Browse by Tags

Related Posts
  • Blog Post: A Microsoft Perspective on Online Identity Theft (2008)

    Identity theft threatens the growth of e-commerce and the provision of financial and government services online. The issue requires a more comprehensive approach to protecting personal information, including consumer education, new technology tools, responsible business practices, a strong legislative...
  • Blog Post: Microsoft's Vision for an Identity Metasystem (2005)

    The Identity Metasystem is an interoperable architecture for digital identity that assumes people will have several digital identities based on multiple underlying technologies, implementations, and providers. Using this approach, customers will be able to continue to use their existing identity infrastructure...
  • Blog Post: The Laws of Identity (2005)

    The Laws of Identity - The Internet was built without a way to know who and what you are connecting to. This limits what we can do with it and exposes us to growing dangers. If we do nothing, we will face rapidly proliferating episodes of theft and deception which will cumulatively erode public trust...
  • Blog Post: The Architect Journal-Identity and Access (2009)

    In this issue, we invite you to think about the identity architecture in your organization. Identity management today is evolving from the single, isolated scenario to a federated one, in ways which may surprise you; a comprehensive look at the evolving role of Identity.