identity

Emphasis on cloud computing, eGovernment, citizen and national e-identities, open identity initatives, law, policy, standards-based identity infrastructures, and secure information sharing and collaboration.

Browse by Tags

Related Posts
  • Blog Post: Microsoft's Vision for an Identity Metasystem (2005)

    The Identity Metasystem is an interoperable architecture for digital identity that assumes people will have several digital identities based on multiple underlying technologies, implementations, and providers. Using this approach, customers will be able to continue to use their existing identity infrastructure...
  • Blog Post: The Laws of Identity (2005)

    The Laws of Identity - The Internet was built without a way to know who and what you are connecting to. This limits what we can do with it and exposes us to growing dangers. If we do nothing, we will face rapidly proliferating episodes of theft and deception which will cumulatively erode public trust...
  • Blog Post: Open Identity Trust Framework Model (Whitepaper)

    Today many online interactions require you to disclose identity information. This poses substantial trust challenges, both for the people who disclose the information and for those who receive it. Until now, this problem has been addressed by a simplistic model in which a third party or identity service...
  • Blog Post: Top 5 security and privacy challenges in identity infrastructures – and how to overcome them with U-Prove

    Commercial businesses and governments are rolling out identity systems to improve their security and to provide online access to services. Current identity framework efforts (including federated identity protocols such as SAML and OpenID) do not provide the highest levels of security and may in fact...
  • Blog Post: A Privacy-compliant Identity Metasystem (2006)

    Just as individual identity is fundamental to our face-to-face interactions, digital identity is fundamental to our interactions in the online world. Unfortunately, many of the challenges associated with the Internet stem from the lack of widely deployed, easily understood, and secure identity solutions...
  • Blog Post: A User-centric Identity Metasystem (2008)

    This paper proposes a framework for protecting privacy and avoiding the unnecessary propagation of identity information while facilitating exchange of specific information needed by Internet systems to personalize and control access to services. It also sets out factors to be taken into consideration...
  • Blog Post: Microsoft releases U-Prove technology

    Today, we took a first step to make the Microsoft U-Prove technology available! First, core portions of the U-Prove intellectual property via a cryptographic specification (under the Microsoft Open Specification Promise ) are available to any interested parties. Two open source software toolkits...
  • Blog Post: Establishing End to End Trust (2008)

    Creating a safer, more trusted Internet - It is not an overstatement to say that the Internet has transformed the way we live. Social networking represents the new town square; blogging has turned citizens into journalists, and e-commerce sites have spurred global competition in the marketplace. But...