Search
Subscribe

Bookmark and Share

About this Blog

As enterprise supply chains and consumer demand chains have beome globalized, they continue to inefficiently share information “one-up/one-down”. Profound "bullwhip effects" in the chains cause managers to scramble with inventory shortages and consumers attempting to understand product recalls, especially food safety recalls. Add to this the increasing usage of personal mobile devices by managers and consumers seeking real-time information about products, materials and ingredient sources. The popularity of mobile devices with consumers is inexorably tugging at enterprise IT departments to shifting to apps and services. But both consumer and enterprise data is a proprietary asset that must be selectively shared to be efficiently shared.

About Steve Holcombe

Unless otherwise noted, all content on this company blog site is authored by Steve Holcombe as President & CEO of Pardalis, Inc. More profile information: View Steve Holcombe's profile on LinkedIn

Follow @WholeChainCom™ at each of its online locations:

« Roger Dean interviews Kim Cameron, Chief Msft Identity Architect | Main | DOD Orange Book »
Friday
Aug212009

A User-Centric Identity Metasystem

Introduction to A User-Centric Identity Metasystem -

This paper proposes a framework for protecting privacy and avoiding the unnecessary propagation of identity information while facilitating exchange of specific information needed by Internet systems to personalize and control access to services. It also sets out factors to be taken into consideration when deciding where the standardization of such a framework should be brought about. Information systems that co-operate to originate, control and consume identity information have been called identity systems. The evolution of the Internet requires increased interoperability of these systems. Such interoperability demands an abstract model that encompasses the characteristics of all co-operating identity systems. We call this abstract model the Identity Metasystem. Describing, designing, deploying and managing identity systems in accordance with this model will facilitate the interworking of identity components:

  • from different manufacturers;
  • under different managements;
  • of different levels of complexity;
  • based on different protocols ;
  • employing different syntaxes;
  • conveying different semantics; and
  • of different ages.

Editor's note ...

With this paper, Kim Cameron, Chief Identity Officer, Microsoft, is seeking to extend Microsoft's Information Cards with 'minimum disclosures' (that is, claims granularly derived from Information Cards). See also Roger Dean interviews Kim Cameron, Chief Msft Identity Architect.

Windows CardSpace (aka Microsoft Information Cards), part of the .NET stack, is Microsoft's client software for the Identity Metasystem, an interoperable architecture for digital identity that enables people to have and employ a collection of digital identities based on multiple underlying technologies, implementations, and providers. When an Information Card-enabled application or website wishes to obtain information about the user, the application or website requests the publication of a particular set of claims authored by the user. The CardSpace user interface then appears, switching the display to the CardSpace service, which displays the user's registered identities. The user selects their InfoCard to verify their identity. See Identity Selector Interoperability Profile V1.0, Microsoft Corporation (April, 2007). See also US Patent 7,149,977: Virtual calling card system and method.

Microsoft's CardSpace is now officially being marketed in the context of the 'Geneva Framework', a Claims Based Access Platform. See also The United Federation of Cloud Providers.

I'm filing A User-Centric Identity Metasystem as a library reference to this blog.

PrintView Printer Friendly Version

EmailEmail Article to Friend

References (5)

References allow you to track sources for this article, as well as articles that were written in response to this article.

Reader Comments

There are no comments for this journal entry. To create a new comment, use the form below.

PostPost a New Comment

Enter your information below to add a new comment.

My response is on my own website »
Author Email (optional):
Author URL (optional):
Post:
 
Some HTML allowed: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <code> <em> <i> <strike> <strong>