identity

Emphasis on cloud computing, eGovernment, citizen and national e-identities, open identity initatives, law, policy, standards-based identity infrastructures, and secure information sharing and collaboration.

Browse by Tags

Related Posts
  • Blog Post: An Introduction to Information Cards and Identity Selectors (2006-2009)

    Information Cards are personal digital identities that people can use online. Visually, each Information Card has a card-shaped picture and a card name associated with it that enables people to organize their digital identities and to easily select one they want to use for any given interaction. There...
  • Blog Post: Open Identity Trust Framework Model (Whitepaper)

    Today many online interactions require you to disclose identity information. This poses substantial trust challenges, both for the people who disclose the information and for those who receive it. Until now, this problem has been addressed by a simplistic model in which a third party or identity service...
  • Blog Post: Open Identity Summit EU 2010 on June 8 (London, UK)

    The OpenID Summit (EU) is an important outreach opportunity for the foundation and a chance for developers, identity providers and relying parties to exchange information in Europe. Topics are expected to include: use cases, issues and problems encountered, solutions proposed, the OpenID v.Next effort...
  • Blog Post: Microsoft at Burton Group's Catalyst Conference 2010 – San Diego, CA (USA)

    On Wednesday, July 28, 2010, we are participating in an Open Identity for Business Interop being held by OSIS at Catalyst in San Diego . This multi-protocol interop event includes exercising the US Government identity profiles developed as part of th e Open Identity Solutions for Open Government initiative...
  • Blog Post: Microsoft at Burton Group's Catalyst Conference 2010 - Prague, CZ

    Please join us on June 21-25, as Kim Cameron, Microsoft Chief Identity Architect presents a session on Microsoft and the future of Identity Modern business has broken through the brick walls of the building; modern IT has not kept up. If IT is going to continue to support the business, it is...
  • Blog Post: An introduction to Open Identity Trust Framework Models (2010)

    Today many online interactions require you to disclose identity information. This poses substantial trust challenges, both for the people who disclose the information and for those who receive it. Until now, this problem has been addressed by a simplistic model in which a third party or identity service...