From IdCommons


This page is about user-centric identity. Identity systems where the user is in control. It is not about enterprise identity management or traditional notions of federation and account linking.

I. Concepts, principles, background


2005 - 2nd half

  • "Linux for suits: Independent Identity", Doc Searls, Cover story of LinuxJournal, September 2005
  • Identity 2.0 keynote at OSCON, Dick Hardt, movie
  • "One login to bind them all", WiredNews, Aug 1 2005
  • "Personal Digital Identity: the unfolding story", Simon Grice and David Goodman, Midentity, July 2005, PDF

2005 - 1st half


  • "This week The [Gillmor] Gang digs deeper into digital identity with a panel of experts. It begins as a Kumbaya of identity vendors and technologies, but by the second half the gloves come off..." IT Conversations - Dec 31st, The Gillmor Gang
  • The Dawn of Independent Identity, Doc Searls, DIDW October 27, 2004 Keynote. PPT.


Augmented Social Network: Weaving Identity and Trust into the Next Generation Internet




  • "Security Without Identification: Transaction Systems to Make Big Brother Obsolete," D. Chaum, (invited) Communications of the ACM, vol. 28 no. 10, October 1985 pp. 1030-1044; Revised version (in Dutch) Informatie, pp. 213, 1987. Extended and revised version: Subtitled "Card Computers to Make Big Brother Obsolete" (in German), Informatik-Spektrum, vol. 10, pp. 262-277 1987; & Datenschutz und Datensicherung, no. 1, 1988, pp. 26-41.

Policy, law and society

Related Documents


Why Trust is Bad for Security, Dieter Gollman, 2005, PPT

  • "D3.2: Models" FIDIS, October, 2005, PDF


  • "The Claim Tool Kit for Ad-hoc Recognition of Peer Entities", J.-M. Seigneur and C. D. Jensen, in the Journal of Science of Computer Programming, Elsevier, 2004. PDF


  • Federation of Identities in a Web Services World, IBM/Microsoft Joint paper, 2003
  • "End-to-end Trust Starts with Recognition", J.-M. Seigneur, S. Farrell, C. D. Jensen, E. Gray, and Y. Chen, in Proceedings of the First International Conference on Security in Pervasive Computing, Boppard, Germany, LNCS 2802, Springer-Verlag, 2003. PDF