identity

Emphasis on cloud computing, eGovernment, citizen and national e-identities, open identity initatives, law, policy, standards-based identity infrastructures, and secure information sharing and collaboration.

Browse by Tags

Related Posts
  • Blog Post: A Microsoft Perspective on Online Identity Theft (2008)

    Identity theft threatens the growth of e-commerce and the provision of financial and government services online. The issue requires a more comprehensive approach to protecting personal information, including consumer education, new technology tools, responsible business practices, a strong legislative...
  • Blog Post: An Introduction to Information Cards and Identity Selectors (2006-2009)

    Information Cards are personal digital identities that people can use online. Visually, each Information Card has a card-shaped picture and a card name associated with it that enables people to organize their digital identities and to easily select one they want to use for any given interaction. There...
  • Blog Post: Microsoft at Burton Group's Catalyst Conference 2010 – San Diego, CA (USA)

    On Wednesday, July 28, 2010, we are participating in an Open Identity for Business Interop being held by OSIS at Catalyst in San Diego . This multi-protocol interop event includes exercising the US Government identity profiles developed as part of th e Open Identity Solutions for Open Government initiative...
  • Blog Post: Availability of the Information Card Issuance Preview

    Today, Microsoft is announcing the availability of the Information Card Issuance Community Technology Preview (CTP) to enable the following scenarios with Active Directory Federation Services 2.0 RTM: Administrators can install an Information Card Issuance component on AD FS 2.0 RTM servers...
  • Blog Post: An introduction to Open Identity Trust Framework Models (2010)

    Today many online interactions require you to disclose identity information. This poses substantial trust challenges, both for the people who disclose the information and for those who receive it. Until now, this problem has been addressed by a simplistic model in which a third party or identity service...