MediaWiki API result

This is the HTML representation of the JSON format. HTML is good for debugging, but is unsuitable for application use.

Specify the format parameter to change the output format. To see the non-HTML representation of the JSON format, set format=json.

See the complete documentation, or the API help for more information.

{
    "batchcomplete": "",
    "continue": {
        "gapcontinue": "Relying_Party",
        "continue": "gapcontinue||"
    },
    "query": {
        "pages": {
            "128": {
                "pageid": 128,
                "ns": 0,
                "title": "Reference",
                "revisions": [
                    {
                        "contentformat": "text/x-wiki",
                        "contentmodel": "wikitext",
                        "*": "= Reference =\n\nThis page is about user-centric identity. Identity systems where the user is in control. It is not about enterprise identity management or traditional notions of federation and account linking.\n\n== I. Concepts, principles, background ==\n\n=== 2006 ===\n\n* TrustGuide Final Report, October 2006, Upload new attachment [http://www.identitygang.org/moin.cgi/Reference?action=AttachFile&rename=Trustguide_-_Final_Report.pdf Trustguide - Final Report] \n\n* [http://www.identitygang.org/moin.cgi/FrontPage?action=AttachFile&do=get&target=privacy_guidelines.doc Microsoft Privacy Guidelines for Developing Software Products and Services ]\n\n=== 2005 - 2nd half ===\n\n* \"Linux for suits: Independent Identity\", Doc Searls, [http://www.linuxjournal.com/article/8357 Cover story of LinuxJournal], September 2005\n* Identity 2.0 keynote at OSCON, Dick Hardt, movie\n* \"One login to bind them all\", [http://www.wired.com/news/privacy/0,1848,68329,00.html WiredNews], Aug 1 2005\n* \"Personal Digital Identity: the unfolding story\", Simon Grice and David Goodman, Midentity, July 2005, [http://corporate.midentity.com/ PDF] \n\n=== 2005 - 1st half ===\n\n*  [http://www.identitygang.org/moin.cgi/Reference?action=AttachFile&rename=Identity_Management_Concepts.pd \"Identity Management Concepts\", Dan Blum, Burton Group, --courtesy of Jamie Lewis\n* Corollaries of Identifiers to the \"Laws of Identity\": [http://www.linuxjournal.com/article/8357 First], [http://www.equalsdrummond.name/index.php?p=19 Second], [http://www.equalsdrummond.name/index.php?p=22 Third], [http://www.equalsdrummond.name/index.php?p=23 Fourth], [http://www.equalsdrummond.name/ Drummond Reed]\n* Four more Laws of Identity: [http://blog.fen.net/archives/000042.html#law_freedom Freedom], [http://blog.fen.net/archives/000042.html#law_decentralization Decentralization], [http://blog.fen.net/archives/000042.html#law_portability Portability], [http://blog.fen.net/archives/000042.html#law_transparency Transparency], Fen Labalme\n* [http://www.identityblog.com/stories/2004/12/09/thelaws.html Laws of Identity], Kim Cameron, Microsoft\n* A Primer on User Identification, [http://www.idcorner.org/ Stefan Brands], Panopticon, The 15th Annual Conference on Computers, Freedom & Privacy, Keeping an Eye on the Panopticon: Workshop on Vanishing Anonymity, Seattle, April 12, 2005. [http://www.identitygang.org/moin.cgi/PDF PDF]. \n\n=== 2004 ===\n* \"This week The [Gillmor] Gang digs deeper into digital identity with a panel of experts. It begins as a Kumbaya of identity vendors and technologies, but by the second half the gloves come off...\" IT Conversations - Dec 31st, The Gillmor Gang\n*  The Dawn of Independent Identity, Doc Searls, DIDW October 27, 2004 Keynote. [http://www.searls.com/doc/2004didw/ PPT]. \n\n=== 2003 ===\n[http://asn.planetwork.net Augmented Social Network: Weaving Identity and Trust into the Next Generation Internet]\n\n=== 2002 ===\n\n* [http://www.networkworld.com/newsletters/dir/2002/01331333.html The need for a personal directory], Dave Kearns, NetworkWorld, May 1, 2002 \n\n=== 2001 ===\n\n* [http://smg.media.mit.edu/people/danah/thesis/ Facted Id/Entity: Managing representation in a digital world], dana boyd, master's thesis, MIT, 2001, PDF \n\n=== 1985 ===\n\n*  [http://www.chaum.com/articles/Security_Wthout_Identification.htm \"Security Without Identification: Transaction Systems to Make Big Brother Obsolete],\" D. Chaum, (invited) Communications of the ACM, vol. 28 no. 10, October 1985 pp. 1030-1044; Revised version (in Dutch) Informatie, pp. 213, 1987. Extended and revised version: Subtitled \"Card Computers to Make Big Brother Obsolete\" (in German), Informatik-Spektrum, vol. 10, pp. 262-277 1987; & Datenschutz und Datensicherung, no. 1, 1988, pp. 26-41. \n\n\n== Policy, law and society ==\n* Montreux Declaration: The protection of personal data and privacy in a globalized world: a universal right respecting diversities, Signed 16 September, 2005, [http://www.identitygang.org/moin.cgi/PDF PDF]. For an elaboration of these principles, see the [http://www.oecd.org/document/18/0,2340,en_2649_34255_1815186_1_1_1_1,00.html OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data (1980)]:\n* [http://civics.typepad.com/realid/ The RealID Act of 2005], MIT online forum\n* [http://www.identitygang.org/moin.cgi/PDF Liberty Alliance Project], \"Circles of Trust: The Implications of EU Data Protection and Privacy Law for Establishing a Legal Framework for Identity Federation\" PDF\n* ACLU [http://www.aclu.org/pizza/ Pizza Movie] --must see. Funny/scary. \n\n== Related Documents ==\n\n=== 2005 ===\nWhy Trust is Bad for Security, Dieter Gollman, 2005, [http://www.identitygang.org/moin.cgi/Reference?action=AttachFile&do=get&target=dg-policy-trust.ppt PPT]\n* \"D3.2: Models\" FIDIS, October, 2005, [http://www.identitygang.org/moin.cgi/Reference?action=AttachFile&do=get&target=fidis-wp2-del2.3.models.pdf PDF] \n\n=== 2004 ===\n\n* \"The Claim Tool Kit for Ad-hoc Recognition of Peer Entities\", J.-M. Seigneur and C. D. Jensen, in the Journal of Science of Computer Programming, Elsevier, 2004. PDF \n\n=== 2003 ===\n\n* Federation of Identities in a Web Services World, IBM/Microsoft Joint paper, 2003\n* \"End-to-end Trust Starts with Recognition\", J.-M. Seigneur, S. Farrell, C. D. Jensen, E. Gray, and Y. Chen, in Proceedings of the First International Conference on Security in Pervasive Computing, Boppard, Germany, LNCS 2802, Springer-Verlag, 2003. PDF"
                    }
                ]
            },
            "259": {
                "pageid": 259,
                "ns": 0,
                "title": "Related Work",
                "revisions": [
                    {
                        "contentformat": "text/x-wiki",
                        "contentmodel": "wikitext",
                        "*": "== Related Projects ==\n=== MyOntology ===\n* Platform: http://myontology.deri.at/prototype\n* Primer: http://www.myontology.org/docs/releaseprimer-myontology-ksiorpaes-20080617.pdf\n* Project: http://www.myontology.org\n\n== Schemas, data, analysis ==\n{|border=\"1\"\n|-\n! Organization\n! Document or Project Name\n! Link\n! Comment\n|-\n|FIDIS\n|Document D3.2 Models, October 2005\n|[http://www.fidis.net/fileadmin/fidis/deliverables/fidis-wp2-del2.3.models.pdf PDF]\n|Catalogue of 25 existing standards to describe various aspects of a person\n|-\n|OASIS\n|OASIS Customer Information Quality (CIQ) TC\n|CIQ\n|Rich models of customer addresses, etc.\n|-\n|OASIS\n|OASIS XRI Data Interchange (XDI) TC\n|[http://oasis-open.org/committees/xdi XDI]\n|Developing a standard schema and service for application- and domain-independent data interchange, including schema-mapping dictionaries. \n|-\n|Netmesh\n|Identity Vocabulary Comparison\n|[http://netmesh.org/papers/identity-vocabularies/NetMesh-identity- PDF]\n|<-- bad link, need to ask Johannes to fix\n|-\n|}\n\n== Links ==\n* [[Identity Schemas]]"
                    }
                ]
            }
        }
    }
}