BIOGRAPHY

Higher resolution versions available below.

Kim Cameron is a leading expert and consultant on digital identity.

Kim is Chief Architect of Identity in the Identity and Access Division at Microsoft, where he champions the emergence of a privacy enhancing Identity Metasystem reaching across technologies, industries, vendors, continents and cultures.

Kim played a leading role in the evolution of Active DirectoryFederation ServicesForefront Identity ManagerCardSpace and Microsoft&#39s other Identity Metasystem products.

He joined Microsoft in 1999 when it bought the ZOOMIT Corporation.  As VP of Technology at ZOOMIT, he had pioneered metadirectory technology and built the first shipping product. Before that he led ZOOMIT&#39s development team in producing a range of SMTP, X.400, X.500, and PKI products.

In 2009 he was appointed a Microsoft Distinguished Engineer.  He grew up in Canada, attending King&#39s College at Dalhousie University and l&#39Université de Montréal.   He served on RISEPTIS, the high-level European Union advisory body providing vision and guidance on security and trust in the Information Society.  He has won a number of industry awards, including Digital Identity World&#39s Innovation Award (2005), Network Computing&#39s Top 25 Technology Drivers Award (1996) and MVP (Most Valuable Player) Award (2005), Network World&#39s 50 Most Powerful People in Networking (2005), Microsoft&#39s Trustworthy Computing Privacy Award (2007) and Silicon.com&#39s Agenda Setters 2007.  In 2010 King&#39s College recognized his work on digital identity by awarding him an honorary Doctor of Civil Law degree.

Kim blogs at identityblog.com, where he published the Laws of Identity.

Photos:
High resolution (3296 x 3240 px)

Medium resolution (210 x 214 px)

Wallet” size (210 x 214 px)

9 thoughts on “BIOGRAPHY

  1. Pingback: Sierra Planet News » Steal This Identity

  2. Pingback: The ID Space » Blog Archive » What is Knowledge Verification?

  3. Pingback: Kim Cameron’s Identity Weblog » Knowledge verification

  4. Pingback: Champion enters the fingerprint fray « The ARCH Blog

  5. Pingback: Blindside : Blog Archive » Seven Laws and Seven Flaws for Managing Identity

  6. Pingback: dale olds’ virtualsoul » Banking on the One True Internet identity system

  7. Mr Cameron,
    I attempted a search on the top identity management blogs on the web and your came up in the top 6. I have recently started a blog with an identity management focus and have been researching what is being written and how it is presented. My target audience is the end user so my posts are less about how and more about why. I attempted a search on the top identity management blogs on the web and yours came up in the top 6. I was wondering if you would be so kind as to take a look at my initial posts and if you find the material intriguing jump in as a follower. Comments are welcome. Constructive criticism is also welcome if you are so inclined. You can find my blog at http://www.twcii.blogspot.com
    Best Regards
    Tom Connell

Leave a Reply