Download presentation
Presentation is loading. Please wait.
Published bySierra Barrett Modified over 11 years ago
1
Copyright 1987-2009 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor – Cyberspace Law & Policy Centre @ UNSW and at the ANU and the Uni. of Hong Kong http://www.rogerclarke.com/ID/IdModel-090605 {.html,.ppt} http://www.rogerclarke.com/ID/IdModelGloss.html IDIS 2009 – Workshop on Identity in the Information Society LSE – 5 June 2009 A Sufficiently Rich Model of (Id)entity, Authentication and Authorisation
2
Copyright 1987-2009 2 A Dialect to Support Discourse on 'Identity in the Information Society' AGENDA Preliminaries The Model The Basic Model Identity, Identifier; Entity, Entifier; Nym Sample Applications (Id)entification Authentication Authorisation Applications of the Model
3
Copyright 1987-2009 3
4
Copyright 1987-2009 4 Preliminaries Deep discourse in a domain needs a specialist dialect Sufficient richness involves about 50 concepts and relationships among the concepts 50 neologisms is too much, so use existing terms Existing terms carry a lot of baggage Each term: requires explicit definition must be related to other terms in the model For each term, the specialist meaning will conflict with the (in most cases, many) existing usages
5
Copyright 1987-2009 5 Names Codes Roles Identity and Identifier
6
Copyright 1987-2009 6 The Entity/ies underlying an Identity
7
Copyright 1987-2009 7 Entity and Entifier
8
Copyright 1987-2009 8 Nymity
9
Copyright 1987-2009 9
10
Copyright 1987-2009 10 (Id)entification Identification The process of associating data with a particular Identity Achieved by acquiring an Identifier for the Identity
11
Copyright 1987-2009 11 (Id)entification Identification The process of associating data with a particular Identity Achieved by acquiring an Identifier for the Identity Entification The process of associating data with a particular Entity Achieved by acquiring an Entifier for the Entity
12
Copyright 1987-2009 12 (Id)entification Identification The process of associating data with a particular Identity Achieved by acquiring an Identifier for the Identity Entification The process of associating data with a particular Entity Achieved by acquiring an Entifier for the Entity Token A recording medium for an Entifier or Identifier Identity Silo A restricted-purpose Identity, and associated Identifier(s)
13
Copyright 1987-2009 13 Authentication of Assertions Authentication: A process that establishes a level of confidence in an Assertion Assertion: a proposition relating to... Assertion Types: a fact, the quality of a Data- item, the value of an Entity, the Location of an Entity, an Attribute of an Entity or an Identity, an Entity, or an Identity
14
Copyright 1987-2009 14 Authentication of Assertions Authentication: A process that establishes a level of confidence in an Assertion Assertion: a proposition relating to... Assertion Types: a fact, the quality of a Data- item, the value of an Entity, the Location of an Entity, an Attribute of an Entity or an Identity, an Entity, or an Identity Authenticator: evidence... Credential: a physical or digital Authenticator EOI: an Authenticator for Identity Assertions
15
Copyright 1987-2009 15 Authorisation
16
Copyright 1987-2009 16 Authorisation
17
Copyright 1987-2009 17 Authorisation: Access Control
18
Copyright 1987-2009 18 Applications Goods Packaging Animals Vehicles Devices Software Organisations Humans
19
Copyright 1987-2009 19 Proxies for Humans Goods Packaging Animals Vehicles Devices Software Organisations Humans Personal Goods Pets Personal Vehicles Personal Handhelds Reg-Code, IP-Address Embedded Chips
20
Copyright 1987-2009 20 Case 1 – Mobile Phones Entifier for the Product – model-name, model-number Entifier for the Handset – Serial-Number of the device Mobile Equipment Identity (IMEI) – GSM / UMTS Electronic Serial Number (ESN) or Mobile Equipment Identifier (MEID) – CDMA Identifier for the Persona – Serial-Number of a chip Subscriber Identity Module (SIM) – GSM / UMTS Removable User Identity Module (R-UIM) or CDMA Subscriber Identity Module (CSIM) – CDMA Universal Subscriber Identity Module (USIM) – 3G Proxy-(Id)entifier – MAC Address / NICId, or IP-Address
21
Copyright 1987-2009 21 Case 2 – Organisations Organisations are non-corporeal, 'shared hallucinations' 'Incorporation' is illusory A register-entry is evidence, not substantiation
22
Copyright 1987-2009 22 Case 2 – Organisations Organisations are non-corporeal, 'shared hallucinations' 'Incorporation' is illusory A register-entry is evidence, not substantiation Entifier name, registration-code Identifier business division, business name, brand, logo (Id)entity Authentication corporate seal?? signatures?? All 'corporate acts' are done by human agents, so...
23
Copyright 1987-2009 23 Case 3 – Humans
24
Copyright 1987-2009 24 Defined Terms in the Model entity, identity, anonymity, pseudonymity, nymity, attributes record, data item, digital persona, data silo (id)entifier, (id)entification, token, nym, anonym, pseudonym, identity silo, multi-purpose / general-purpose identifier authentication, authentication strength, assertion, assertion categories, authenticator, credential, (id)entity authentication, evidence of (id)entity, (id)entity credential authorisation/permission/privilege, user, loginid/userid/username, account, access control, registration, pre-authentication, enrolment, single sign-on, simplified sign-on, identity management
25
Copyright 1987-2009 25 A Dialect to Support Discourse on 'Identity in the Information Society' AGENDA Preliminaries The Model The Basic Model Identity, Identifier; Entity, Entifier; Nym Sample Applications (Id)entification Authentication Authorisation Applications of the Model
26
Copyright 1987-2009 26 Roger Clarke Xamax Consultancy, Canberra Visiting Professor – Cyberspace Law & Policy Centre @ UNSW and at the ANU and the Uni. of Hong Kong http://www.rogerclarke.com/ID/IdModel-090605 {.html,.ppt} http://www.rogerclarke.com/ID/IdModelGloss.html IDIS 2009 – Workshop on Identity in the Information Society LSE – 5 June 2009 A Sufficiently Rich Model of (Id)entity, Authentication and Authorisation
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.