{"id":1048,"date":"2009-06-08T10:18:48","date_gmt":"2009-06-08T18:18:48","guid":{"rendered":"\/?p=1048"},"modified":"2009-06-08T21:22:14","modified_gmt":"2009-06-09T05:22:14","slug":"proposal-for-a-common-identity-framework","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=1048","title":{"rendered":"Proposal for a Common Identity Framework"},"content":{"rendered":"<p>Today I am posting a new paper called, <a href=\"\/wp-content\/images\/2009\/06\/UserCentricIdentityMetasystem.html\" class=\"broken_link\">Proposal for a Common Identity Framework: A User-Centric Identity Metasystem<\/a>.<\/p>\n<p>Good news: it doesn\u2019t propose a new protocol!<\/p>\n<p>Instead, it attempts to crisply articulate the requirements in creating a privacy-protecting identity layer for the Internet, and sets out a formal model for such a layer, defined through the set of services the layer must provide.<\/p>\n<p>The paper is the outcome of a year-long collaboration between Dr. Kai Rannenberg, Dr. Reinhard Posch and myself. We were introduced by Dr. Jacques Bus, Head of Unit Trust and Security in ICT Research at the European Commission.<\/p>\n<p>Each of us brought\u00a0our different cultures, concerns, backgrounds\u00a0and experiences to the project and we occasionally struggled to understand how\u00a0our different slices of reality fit together. But it was in those very areas that we ended up with some of the most interesting results.<\/p>\n<p>Kai holds the <a href=\"http:\/\/www.m-chair.net\/\">T-Mobile Chair for Mobile Business and Multilateral Security<\/a> at <a href=\"http:\/\/www.uni-frankfurt.de\/\">Goethe University Frankfurt<\/a>. He coordinates the EU research projects <a href=\"http:\/\/www.fidis.net\/\" class=\"broken_link\">FIDIS <\/a>\u00a0(Future of Identity in the Information Society), a multidisciplinary endeavor of 24 leading institutions from research, government, and industry, and <a href=\"http:\/\/www.picos-project.eu\/\" class=\"broken_link\">PICOS<\/a> (Privacy and Identity Management for Community Services).\u00a0 He also is Convener of the ISO\/IEC Identity Management and Privacy Technology working group (JTC 1\/<a href=\"http:\/\/www.jtc1sc27.din.de\/en\">SC 27<\/a>\/WG 5) \u00a0and Chair of the IFIP <a href=\"http:\/\/www.tc11.uni-frankfurt.de\/\">Technical Committee 11<\/a> \u201cSecurity and Privacy Protection in Information Processing Systems\u201d.<\/p>\n<p>Reinhard taught <a href=\"http:\/\/www.iaik.tugraz.at\/\">Information Technology at Graz University <\/a>beginning in the mid 1970\u2019s, and was Scientific Director of the Austrian Secure Information Technology Center starting in 1999. He has been federal CIO for the Austrian government since 2001, and was elected chair of the management board of <a href=\"http:\/\/www.enisa.europa.eu\/\">ENISA <\/a>(The European Network and Information Security Agency) in 2007.\u00a0<\/p>\n<p>I invite you to <a href=\"\/wp-content\/images\/2009\/06\/UserCentricIdentityMetasystem.html\" class=\"broken_link\">look\u00a0at our paper<\/a>.\u00a0 It\u00a0aims at combining the ideas set out in the <a href=\"https:\/\/www.identityblog.com\/stories\/2004\/12\/09\/thelaws.html\" class=\"broken_link\">Laws of Identity<\/a> and\u00a0related papers, extended discussions and blog posts from the open identity community, the formal principles of Information Protection that have evolved in Europe, research on <a href=\"http:\/\/en.wikipedia.org\/wiki\/Privacy_enhancing_technologies\">Privacy Enhancing Technologies<\/a> (PETs), outputs from key working groups and academic conferences, and deep experience with EU government digital identity initiatives.<\/p>\n<p>Our work\u00a0is included in <a href=\"http:\/\/www.amazon.com\/Future-Identity-Information-Society-Opportunities\/dp\/3540884807\/ref=sr_1_1?ie=UTF8&amp;s=books&amp;qid=1243988071&amp;sr=1-1\">The Future of Identity in the Information Society<\/a> &#8211; a report on research carried out\u00a0in a number of different EU states on topics like the identification of citizens, ID cards,\u00a0and Virtual Identities, with an accent on privacy, mobility, interoperability, profiling, forensics, and identity related crime.<\/p>\n<p>I\u2019ll be taking up the ideas in our paper in a number of blog posts going forward. My hope is that\u00a0readers will find the model useful\u00a0in advancing the way they think about the architecture of their identity systems.\u00a0 I\u2019ll be extremely interested in feedback, as will Reinhard and Kai, who I hope will feel free to join into the conversation as voices independent from my own.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A User-Centric Identity Metasystem<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[6,8,3,11,64,5],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/1048"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1048"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/1048\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1048"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1048"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1048"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}