dc.contributor.author |
Thomborson, Clark |
en |
dc.coverage.spatial |
National Institute of Standards and Technology, Gaithersburg MD (USA) |
en |
dc.date.accessioned |
2018-10-03T21:40:31Z |
en |
dc.date.issued |
2012-03-16 |
en |
dc.identifier.uri |
http://hdl.handle.net/2292/38597 |
en |
dc.description.abstract |
Increasingly, our online identity is defined and verified by "who communicates with us": our network of friends, colleagues, and associates. Identifications and authentications via our network can extend, strengthen, and occasionally even replace, the three types of point-identifications: "what we know", "what we have", and "who we are". In this seminar, I'll explore the implications of modelling a set of people and their computational agents as a set of point-identities, with three types of edges between points. Alias edges connect two facets of the same person, agent, or organisation. Freely-communicating entities are linked by peering edges; and there is a hierarchical relation between a "superior" entity and each of its inferiors. When an identity graph is viewed as a model of personal identity, the points are personae. When viewed as a model of organisational identity, the points are roles. The persona/role duality of networked identities is fundamental to The Jericho Forum's recently-published Identity Commandments (http://www.opengroup.org/jericho/Jericho%20Forum%20Identity%20Com andments%20v1.0.pdf). Many types of privacy claims can be modelled as edge-separators in a networked-identity graph. We are currently exploring the possibility that identity claims and authenticators are naturally expressed as fragments of an identity graph; if this is the case, then our modelling approach would be a useful component in an interoperability standard for identity management systems. |
en |
dc.rights |
Items in ResearchSpace are protected by copyright, with all rights reserved, unless otherwise indicated. Previously published items are made available in accordance with the copyright policy of the publisher. |
en |
dc.rights.uri |
https://researchspace.auckland.ac.nz/docs/uoa-docs/rights.htm |
en |
dc.title |
Networked Identity (presentation at Nat'l Inst Standards & Technology, Gaithersburg MD USA) |
en |
dc.type |
Presentation |
en |
dc.rights.holder |
Copyright: The author |
en |
dc.rights.accessrights |
http://purl.org/eprint/accessRights/RestrictedAccess |
en |
pubs.subtype |
Oral Presentation (Not presented at a conference) |
en |
pubs.elements-id |
365311 |
en |
pubs.record-created-at-source-date |
2012-11-26 |
en |