Factbites
 Where results make sense
About us   |   Why use us?   |   Reviews   |   PR   |   Contact us  

Topic: Digital Identity


Related Topics

In the News (Tue 16 Jul 19)

  
  The Laws of Identity   (Site not responding. Last check: 2007-10-21)
This lack of agreement arises because digital identity is related to context, and the Internet, while being a single technical framework, is experienced through a thousand kinds of content in at least as many different contexts—all of which flourish on top of that underlying framework.
Digital identity systems must be designed so the disclosure of identifying information is limited to parties having a necessary and justifiable place in a given identity relationship.
If she does, a short-lived unidirectional identity relation could be established between the computer and the projector—providing a secure connection while divulging the least possible identifying information in accordance with the law of minimal disclosure.
msdn2.microsoft.com /en-us/library/ms996456.aspx   (6154 words)

  
  Digital identity - Wikipedia, the free encyclopedia
Digital identity refers to the aspect of digital technology that is concerned with the mediation of people's experience of their own identity and the identity of other people and things.
Digital identity also has another common usage as the digital representation of a set of claims made by one digital subject about itself or another digital subject.
A digital subject is an entity represented or existing in the digital realm which is being described or dealt with.
en.wikipedia.org /wiki/Digital_identity   (1260 words)

  
 Felix Stalder: Digital Identities ­ Patterns in Information Flows
Identity is dynamic and unstable; it is the result of negotiations between claims and counterclaims; it reflects and defines the relationships between individuals and their environment; and, the way identity is built or deconstructed is deeply dependent on the communication technologies available.
For sociologists, identity, in the classic formulation of Peter Berger (1963), is "socially bestowed, socially maintained and socially transformed." It is sometimes analyzed in terms of behaviour that allows to recognize someone as a member of a specific group.
Identity and fixity are the enemies of communication and have to be combated by nomadism and collective identity.
felix.openflows.org /html/digital_identity.html   (5988 words)

  
 Identity - Wikipedia, the free encyclopedia
Cultural identity is a person's self-affiliation (or categorization by others) as a member of a cultural group.
Digital identity is the representation of identity in terms of digital information.
Identity theft is the deliberate appropriation of someone else's identity (without that person's permission) for criminal purposes.
en.wikipedia.org /wiki/Identity   (325 words)

  
 The Identity On-Ramp :: Digital Identity World :: Digital Identity, Identity Management
That is to say, that I think that consumer digital identity will be much like the evolution of complex adaptive systems.
The Identity On-Ramp is the lead-in to the larger ecosystem.
Getting customers to adopt varying degrees of digital identity allows financial services companies everywhere to know that you are who you say you are with a greater degree of certainty.
www.digitalidworld.com /modules.php?op=modload&name=News&file=article&sid=103&mode=chrono&order=0   (879 words)

  
 Digitial Identity in Cyberspace
Digital environments have inherent differences from real space which causes this discrepancy, and when implementing an identity system for cyberspace one needs to consider more than just the architectural nature of the system - any system chosen will have social repercussions which need to be also taken into account.
Today, digital certificates are issued with all information in one certificate, and there is a dependence on the user to keep their certificates from being stolen or used by others.
To trace the identity, therefore, the law enforcement agent would have to contact the web site and demand to know which pseudonym is related to a known transaction, followed by a similar request to the certificate authority about the real identity associated with the pseudonym.
www.swiss.ai.mit.edu /6095/student-papers/fall98-papers/identity/white-paper.html   (20216 words)

  
 Microsoft's Vision for an Identity Metasystem   (Site not responding. Last check: 2007-10-21)
Studying the Passport experience and other digital identity initiatives throughout the industry led us to work with a wide range of industry experts to codify a set of principles that we believe are fundamental to a successful, broadly adopted, and enduring digital identity system on the Internet.
Digital identities consist of sets of claims made about the subject of the identity, where "claims" are pieces of information about the subject that the issuer asserts are valid.
An identity metasystem, as defined by the Laws of Identity, would supply a unifying fabric of digital identity, utilizing existing and future identity systems, providing interoperability between them, and enabling the creation of a consistent and straightforward user interface to them all.
msdn.microsoft.com /library/default.asp?url=/library/en-us/dnwebsrv/html/identitymetasystem.asp   (4046 words)

  
 Identity Gang - Digital Identity   (Site not responding. Last check: 2007-10-21)
Of course, in some contexts, a description ([[Digital Identity]]) may be specific enough that it can only apply to a single subject within that context.
The emergence of a "digital identity" concept that includes lots of information about people (OK, subjects), not just unique identifiers and authenticators, is reflective of the growth of the Internet to support the wide range interests of many people, not just the accountability requirements of the managers of expensive resources.
While this may be new thinking regarding identity in the digital realm, in fact it is a straighforward alignment of online identity with traditional notions of personal identity as "stuff about you that is shared with others".
www.identitygang.org /DigitalIdentity   (471 words)

  
 Digital Identity
Debate at the intersection of business, technology and culture in the world of digital identity, both commercial and government, a blog born from the annual Digital Identity Forum in London.
What this means is that you are welcome to add the Digital Identity blog's recent posts to your own web pages and blogs by simply copying and pasting a simple bit of html.
What's more, since each of them may be dealing with a number of different banks and each bank on they use may require different levels of integration and security, they have desks cluttered with smart cards, USB tokens and key fobs for different log-ins and transaction approvals.
digitaldebateblogs.typepad.com /digital_identity   (1396 words)

  
 Digital Identity - GotzeTagged
Digital identity can be discussed in the context of a set of concepts that provide a framework for addressing the important issues involved in developing an organizational identity management strategy.
There are specific tips for identity and security architects on how to locate and use metrics in their identity management processes and systems.
Identity Federation, a key concept driving the need for and the definition of SAML, means using information from multiple, independently administered sources to implement security services such as authorization.
slashdemocracy.org /links/Digital_Identity   (988 words)

  
 Q&A: Microsoft's Kim Cameron Wins 'Balancing Innovation and Reality' Award for Contributions to Digital Identity: ...
Microsoft's chief architect of identity and access outlines his vision for the "Laws of Identity," as well as the work the identity management community is doing to solve today's toughest digital identity problems.
We need a system for digital identity that assumes people will have several digital identities based on multiple underlying identity technologies, implementations and providers -- one that ultimately helps users and organizations better safeguard their digital identities and privacy.
The Law of Justifiable Parties: Digital identity systems must be designed so the disclosure of identifying information is limited to parties having a necessary and justifiable place in a given identity relationship.
www.microsoft.com /presspass/features/2005/may05/05-12DigitalID.mspx   (2043 words)

  
 Digital Identity Management and Protection
Digital identity corresponds to the electronic information associated generally with an individual in a particular identity system.
Identity systems are used by online service providers to authenticate and authorize users to services protected by access policies.
In a Federal Trade Commission (FTC) (report) it was given that there have been 27.3 million cases of identity theft in the last five years, with roughly half of those occurring in 2004 itself.
homes.cerias.purdue.edu /~bhargav/IdM   (890 words)

  
 Digital Identity
Digital Identity (screenshot) is a system for securely managing passwords and PIN's.
Digital Identity is unique for a number of reasons, including: low price (free), includes ability to encrypt files, advanced password recovery system which uses an image as a key to the application, and is able to hide files and messages in images (steganography).
Digital Identity allows the master password to be stored in an image, which can be used to unlock the application when the master password is not known.
lukemurphey.net /DigitalIdentity   (532 words)

  
 Random Thoughts on Digital Identity - Glossary
The stronger the authentication, the higher the confidence that the user of the identity is its owner.
Roger Clarke.] (3) Authentication is the act of verifying that identity, where a verification consists in establishing, to the satisfaction of the verifier, that the sign signifies the entity.
identity ; it is one or more data items that distinguishes an identity from other identities.
blog.onghome.com /glossary.htm   (1093 words)

  
 CorporatePR: Thinking about Digital Identity
In an age of digital identity, we are all cyborgs.
And, if we think of identity as distributed, pieces of it can sometimes be an object, for example when expressions of it can be found that are, in a sense, material: blog posts, comments, emails, wiki pages and so forth.
I was pleased to see that Elizabeth Albrycht has chosen the issue of digital identity as the subject of her thesis.
ringblog.typepad.com /corporatepr/2006/05/thinking_about_.html   (2764 words)

  
 Johannes Ernst's Blog
Is Digital Identity only important to a small minority (such as these folks) who have drunk the Cool Aid, or is the Digital Identity cause inevitably going to take over the world at some time?
There are the "enterprise digital identity people" (example quotes courtesy of CNet's Dan Farber) who talk about compliance, identity management, security, policies and so forth.
There are the "Digital identity as a convenience" people (such as when A9 uses Amazon account names).
netmesh.info /jernst/Digital_Identity/why-digital-identity-matters.html   (1012 words)

  
 btw.net Weblog
Pieces of our identity are doled out across the many computer systems and networks used by our employers, ISPs, bulletin boards, instant messaging systems, and online businesses, all with little coordination, interaction, or control on our part.
Pugh said he has learned the hard way how malleable an online and electronic identity is once he moved to the United States from the United Kingdom a few years ago and was forced to start a new identity from scratch.
Although they interconnect, they're really two different worlds and a common digital identity solution that spans all of the needs and stakeholders is unlikely.
radio.weblogs.com /0115330/categories/digitalIdentity   (489 words)

  
 Kim Cameron’s Identity Weblog » Digital Identity
(Identity and Laws of Identity and Digital Identity and Identity Metasystem)
(Digital Identity and Identity Metasystem and OSIS and infocard and Cardspace)
(Digital Identity and Identity Metasystem and OSIS and Cardspace)
www.identityblog.com /?cat=6   (747 words)

  
 O'Reilly - Safari Books Online - 0596008783 - Digital Identity
IMA is a coherent, enterprise-wide set of standards, policies, certifications and management activities that enable companies like yours to manage digital identity effectively--not just as a security check, but as a way to extend services and pinpoint the needs of customers.
Managing digital identity is one of the most fundamental activities in IT and a good identity management strategy is the key to not only protecting the enterprise from attack, but, more important, providing flexible access for partners, customers, and employees to needed information and systems.
Identity relationships are inherently web-like in structure while centralized technologies like directories are hierarchical." Windley also points out lack of privacy support in SAML (which is why Dick Hardt calls federation Identity 1.5).
safari.oreilly.com /0596008783   (1694 words)

  
 The Digital Person
For example, they increase our vulnerability to identity theft, a serious crime that has been escalating at an alarming rate.
Using a wide variety of sources, including history, philosophy, and literature, Solove sets forth a new understanding of what privacy is, one that is appropriate for the new challenges of the Information Age.
The Digital Person is an important contribution to the privacy debate, and Solove’s discussion of the harms of what he calls ‘digital dossiers’ is invaluable”
docs.law.gwu.edu /facweb/dsolove/Solove-Digital-Person.htm   (1119 words)

  
 JOHO - April 15, 2004
A Digital Identity is the representation of a human identity that is used in a distributed network interaction with other machines or people...
Further, just because you have an identity when the police are protecting you doesn't mean that you have an identity when there's no question about who you are; once your identity has become public knowledge and taken for granted, people aren't going to talk about it any more.
But within the digital world, there's only information, so digital ID connects one bundle of information with another; e.g., the information on this form can be trusted because it accords with information from some trusted source.
www.hyperorg.com /backissues/joho-apr15-04.html   (1982 words)

  
 Amazon.com: Digital Identity: Books: Phillip J Windley   (Site not responding. Last check: 2007-10-21)
Providing identity services between people, websites, and organizations that don't necessarily have a formalized relationship is a different problem than providing authentication and authorization services within a single organization.
Even when there is no problem of identity theft, it is not uncommon for people to have 10 or more names linked to their credit reports due to various errors, including permutation of their name.
The book notes that the real challenge in developing a federated identity infrastructure is dealing with the various different hardware and software platforms where user accounts reside, and working with different organizations and departments, including the ever-increasing amount of outsourcing.
www.amazon.com /exec/obidos/ASIN/0596008783/windleyofente-20   (2856 words)

  
 Encentuate - Strong Authentication and Digital Identity Management   (Site not responding. Last check: 2007-10-21)
Strong digital identity is the cornerstone of enterprise digital infrastructure.
Companies that lack strong digital identity in their digital infrastructures are at risk in these areas.
Weak digital identities are the root causes of the vast majority of security breaches and the lack of accountability in digital networks.
www.encentuate.com /resources/revolution.htm   (1274 words)

  
 FrontPage - Identity Gang Wiki
If you are interested in joining this community you must be sponsored by an existing subscriber or you can request a subscription by emailing Paul, Phil or Kaliya.
The Identity Gang is a Working Group of Identity Commmons.
To support the ongoing conversation about what is needed for a user-centric identity "metasystem" that supports the whole marketplace, especially individuals.
www.identitygang.org   (283 words)

  
 Identity, Authentication & Digital Certificates
Digital authentication systems are expected to become an essential part of doing business via the Internet.
Based on a range of encryption techniques, digital signature systems allow people and organizations to electronically certify such features as their identity, their ability to pay, or the authenticity of an electronic document.
Policies governing the collection of information for digital signatures, and the architecture and legal liabilities associated with these technologies, raise important privacy and consumer protection issues.
www.cdt.org /digsig   (783 words)

  
 Digital Identity Mapping on Flickr - Photo Sharing!   (Site not responding. Last check: 2007-10-21)
Digital Identity Mapping on Flickr - Photo Sharing!
I'm using the example to show some people what is Digital Identity about.
Sign up for a free account, or sign in (if you're already a member).
www.flickr.com /photos/fredcavazza/278973402   (107 words)

  
 representations of digital identity   (Site not responding. Last check: 2007-10-21)
As we pass through the world, we give off information about cultural identity (ethnicity, sex, age, etc), social class, individual personality (through dress or physical alterations) and psychological state (through movement and tone of voice).
In computer-mediated communication (CMC), the performance of identity occurs not through direct experience of the body but within the constraints of digital representations constructed by interactive systems.
Furthermore, researchers interested in reputation, trust, privacy and vulnerability; social networks, identity, persistent conversations, and context are encouraged to apply.
www.ischool.berkeley.edu /~dmb/cscw2004-identity   (385 words)

Try your search on: Qwika (all wikis)

Factbites
  About us   |   Why use us?   |   Reviews   |   Press   |   Contact us  
Copyright © 2005-2007 www.factbites.com Usage implies agreement with terms.