Networked Identity (presentation at Nat'l Inst Standards & Technology, Gaithersburg MD USA)

ResearchSpace/Manakin Repository

Show simple item record

dc.contributor.author Thomborson, Clark en
dc.coverage.spatial National Institute of Standards and Technology, Gaithersburg MD (USA) en
dc.date.accessioned 2018-10-03T21:40:31Z en
dc.date.issued 2012-03-16 en
dc.identifier.uri http://hdl.handle.net/2292/38597 en
dc.description.abstract Increasingly, our online identity is defined and verified by "who communicates with us": our network of friends, colleagues, and associates. Identifications and authentications via our network can extend, strengthen, and occasionally even replace, the three types of point-identifications: "what we know", "what we have", and "who we are". In this seminar, I'll explore the implications of modelling a set of people and their computational agents as a set of point-identities, with three types of edges between points. Alias edges connect two facets of the same person, agent, or organisation. Freely-communicating entities are linked by peering edges; and there is a hierarchical relation between a "superior" entity and each of its inferiors. When an identity graph is viewed as a model of personal identity, the points are personae. When viewed as a model of organisational identity, the points are roles. The persona/role duality of networked identities is fundamental to The Jericho Forum's recently-published Identity Commandments (http://www.opengroup.org/jericho/Jericho%20Forum%20Identity%20Com andments%20v1.0.pdf). Many types of privacy claims can be modelled as edge-separators in a networked-identity graph. We are currently exploring the possibility that identity claims and authenticators are naturally expressed as fragments of an identity graph; if this is the case, then our modelling approach would be a useful component in an interoperability standard for identity management systems. en
dc.rights Items in ResearchSpace are protected by copyright, with all rights reserved, unless otherwise indicated. Previously published items are made available in accordance with the copyright policy of the publisher. en
dc.rights.uri https://researchspace.auckland.ac.nz/docs/uoa-docs/rights.htm en
dc.title Networked Identity (presentation at Nat'l Inst Standards & Technology, Gaithersburg MD USA) en
dc.type Presentation en
dc.rights.holder Copyright: The author en
dc.rights.accessrights http://purl.org/eprint/accessRights/RestrictedAccess en
pubs.subtype Oral Presentation (Not presented at a conference) en
pubs.elements-id 365311 en
pubs.org-id Faculty of Science en
pubs.org-id Computer Science en
pubs.record-created-at-source-date 2012-11-26 en


Full text options

Full text for this item is not available in ResearchSpace.

Find Full text

This item appears in the following Collection(s)

Show simple item record

Share

Search ResearchSpace


Advanced Search

Browse