Identity: Difference between revisions

From P2P Foundation
Jump to navigation Jump to search
No edit summary
unknown (talk)
No edit summary
 
(12 intermediate revisions by 2 users not shown)
Line 1: Line 1:


'''= this overview entry refers to the technological aspects of identity'''


=Related Entries=


=Discussions=


==Concepts==


==Using "Entities" in Identity Systems==
#[[Digital Identity]]
#[[Group Identity]]
#[[Identity Commons]]
#[[Identity Rights Management]]
#[[Identity Standards]]
#[[Identity 2.0]]
#[[Laws of Identity]]


Silona on why identity systems should be based on 'entities':


"We can take things a step back.  An entity can be a person, group, band,
==Products==
affiliation, business - whatever.  You can then add differentiation
architecture on top of that.  Things that identify what KIND of entity
they are and create special datastructures for each.  It allows for
growth and expansion.


We are social creatures and act more within these other expanded
* [[MicroID]]
structures than just a friend to friend model.  A friend to friend model
* [[Open ID]]
has a limit of 150 (dunbar number.)  With group associations (and such),
* The [[infoliberalism]] project, starts with a software that includes a P2P online identity solution called "Global Login System".
we can expand that network.  It is one reason myspace is successful
despite its horrid interface.




=Laws of Identity=
=Key Books to Read=


 
#A [[Crowd of One]]. By John Clippinger.
==Seven Laws of Identity - Kim Cameron==
#[http://www.mitpressjournals.org/toc/dmal/-/6 Youth, Identity, and Digital Media]. MacArthur Foundation.
 
Shortened version of an excellent introductory overview by Kim Cameron
at http://www.identityblog.com/stories/2004/12/09/thelaws.html
 
 
'''1. User Control and Consent'''
 
Technical identity systems must only reveal information identifying a user with the user’s consent. (Blogosphere discussion starts here…)
 
 
 
'''2. Minimal Disclosure for a Constrained Use'''
 
The solution that discloses the least amount of identifying information and best limits its use is the most stable long-term solution.
 
The concept of “least identifying information” should be taken as meaning not only the fewest number of claims, but the information least likely to identify a given individual across multiple contexts.
 
We can also express the Law of Minimal Disclosure this way: aggregation of identifying information also aggregates risk. To minimize risk, minimize aggregation.
 
 
'''3. Justifiable Parties'''
 
Digital identity systems must be designed so the disclosure of identifying information is limited to parties having a necessary and justifiable place in a given identity relationship.
 
The identity system must make its user aware of the party or parties with whom she is interacting while sharing information.
 
 
 
'''4. Directed Identity'''
 
A universal identity system must support both “omni-directional” identifiers for use by public entities and “unidirectional” identifiers for use by private entities, thus facilitating discovery while preventing unnecessary release of correlation handles. (Starts here…)
 
 
 
'''5. Pluralism of Operators and Technologies'''
 
A universal identity system must channel and enable the inter-working of multiple identity technologies run by multiple identity providers.  
 
The universal identity metasystem must not be another monolith. It must be polycentric (federation implies this) and also polymorphic (existing in different forms). This will allow the identity ecology to emerge, evolve, and self-organize.
 
 
'''6. Human Integration'''
 
The universal identity metasystem must define the human user to be a component of the distributed system integrated through unambiguous human-machine communication mechanisms offering protection against identity attacks. (Starts here…)
 
 
 
'''7. Consistent Experience Across Contexts'''
 
The unifying identity metasystem must guarantee its users a simple, consistent experience while enabling separation of contexts through multiple operators and technologies.
 
As users, we need to see our various identities as part of an integrated world that nonetheless respects our need for independent contexts."
(http://www.identityblog.com/stories/2004/12/09/thelaws.html)
 
 
==Fen Labalme's additions==
 
From the entry, 'Four More Laws of Identity', at
http://blog.fen.net/archives/000042.html
 
 
'''8. Freedom'''
   
The entity (often a person) using an online digital identity system must be in total control of their information. This implies that not only the data but also the access protocols and authorization mechanisms must not be encumbered by someone else's (IP) rights, unless such restrictions were previously - and explicitly - agreed to.
 
 
'''9. Decentralization'''
   
An identity system should be decentralized.
 
 
'''10. Portability'''
   
Bridges must exist - or be straightforward to create - between identity systems so that users are not locked into a single provider.
 
 
'''11. Transparency'''
   
There should be a clear and (if desired) visible cause and effect relationship in all identity related transactions."
(http://blog.fen.net/archives/000042.html)
 
 
==Drummond Reed's Corrollaries==
 
[http://www.equalsdrummond.name/ Drummond Reed] has published corrolaries to the above principles, which are listed here at http://www.identitygang.org/Reference




=More Information=
=More Information=


See the related entries on [[Reputation]], [[Trust]], [[Privacy]], [[Anonymity]]
#Essay by David Buckingham: [http://www.mitpressjournals.org/doi/pdf/10.1162/dmal.9780262524834.001 Introducing Identity]


[[Identity Standards]] are listed here at http://www.identitygang.org/Reference
"I found particularly helpful the first piece on “Introducing Identity” by David Buckingham, which took on the hard definitional and discipline-related questions of identity in this context. He put a huge amount of scholarship into context, with sharp critiques along the way."
 
(http://blogs.law.harvard.edu/digitalnatives/2008/01/10/macarthurmit-press-series-on-youth-media-and-learning/)
Identity discussion at http://www.identityblog.com/


[[Category:Encyclopedia]]
[[Category:Relational]]
[[Category:Standards]]
[[Category:P2P Infrastructure]]


[[Category:Encyclopedia]]
[[Category:Encyclopedia]]
[[Category:Governance]]
[[Category:Relational]]
[[Category:Relational]]
[[Category:Standards]]
[[Category:Standards]]
[[Category:P2P Infrastructure]]

Latest revision as of 07:11, 14 September 2020

= this overview entry refers to the technological aspects of identity

Related Entries

Concepts

  1. Digital Identity
  2. Group Identity
  3. Identity Commons
  4. Identity Rights Management
  5. Identity Standards
  6. Identity 2.0
  7. Laws of Identity


Products

  • MicroID
  • Open ID
  • The infoliberalism project, starts with a software that includes a P2P online identity solution called "Global Login System".


Key Books to Read

  1. A Crowd of One. By John Clippinger.
  2. Youth, Identity, and Digital Media. MacArthur Foundation.


More Information

  1. Essay by David Buckingham: Introducing Identity

"I found particularly helpful the first piece on “Introducing Identity” by David Buckingham, which took on the hard definitional and discipline-related questions of identity in this context. He put a huge amount of scholarship into context, with sharp critiques along the way." (http://blogs.law.harvard.edu/digitalnatives/2008/01/10/macarthurmit-press-series-on-youth-media-and-learning/)