Reference

From IdCommons

Reference

This page is about user-centric identity. Identity systems where the user is in control. It is not about enterprise identity management or traditional notions of federation and account linking.

I. Concepts, principles, background

2006

2005 - 2nd half

  • "Linux for suits: Independent Identity", Doc Searls, Cover story of LinuxJournal, September 2005
  • Identity 2.0 keynote at OSCON, Dick Hardt, movie
  • "One login to bind them all", WiredNews, Aug 1 2005
  • "Personal Digital Identity: the unfolding story", Simon Grice and David Goodman, Midentity, July 2005, PDF

2005 - 1st half

2004

  • "This week The [Gillmor] Gang digs deeper into digital identity with a panel of experts. It begins as a Kumbaya of identity vendors and technologies, but by the second half the gloves come off..." IT Conversations - Dec 31st, The Gillmor Gang
  • The Dawn of Independent Identity, Doc Searls, DIDW October 27, 2004 Keynote. PPT.

2003

Augmented Social Network: Weaving Identity and Trust into the Next Generation Internet

2002

2001

1985

  • "Security Without Identification: Transaction Systems to Make Big Brother Obsolete," D. Chaum, (invited) Communications of the ACM, vol. 28 no. 10, October 1985 pp. 1030-1044; Revised version (in Dutch) Informatie, pp. 213, 1987. Extended and revised version: Subtitled "Card Computers to Make Big Brother Obsolete" (in German), Informatik-Spektrum, vol. 10, pp. 262-277 1987; & Datenschutz und Datensicherung, no. 1, 1988, pp. 26-41.


Policy, law and society

Related Documents

2005

Why Trust is Bad for Security, Dieter Gollman, 2005, PPT

  • "D3.2: Models" FIDIS, October, 2005, PDF

2004

  • "The Claim Tool Kit for Ad-hoc Recognition of Peer Entities", J.-M. Seigneur and C. D. Jensen, in the Journal of Science of Computer Programming, Elsevier, 2004. PDF

2003

  • Federation of Identities in a Web Services World, IBM/Microsoft Joint paper, 2003
  • "End-to-end Trust Starts with Recognition", J.-M. Seigneur, S. Farrell, C. D. Jensen, E. Gray, and Y. Chen, in Proceedings of the First International Conference on Security in Pervasive Computing, Boppard, Germany, LNCS 2802, Springer-Verlag, 2003. PDF