INTRODUCTION TO THE LAWS OF IDENTITY

The Internet was built without a way to know who and what you are connecting to. This limits what we can do with it and exposes us to growing dangers. If we do nothing, we will face rapidly proliferating episodes of theft and deception that will cumulatively erode public trust in the Internet. We have undertaken … Continue reading INTRODUCTION TO THE LAWS OF IDENTITY

THE LAWS OF IDENTITY

Kim Cameron Identity and Access Architect Microsoft Corporation May 2005 Applies to: Security Web development Web services Summary: Understand the dynamics causing digital identity systems to succeed or fail in various contexts, expressed as the Laws of Identity. Together these laws define a unifying identity metasystem that can offer the Internet the identity layer it … Continue reading THE LAWS OF IDENTITY