Presentation is loading. Please wait.

Presentation is loading. Please wait.

Copyright 1987-2009 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor – Cyberspace Law & Policy UNSW and at the ANU and the Uni. of.

Similar presentations


Presentation on theme: "Copyright 1987-2009 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor – Cyberspace Law & Policy UNSW and at the ANU and the Uni. of."— Presentation transcript:

1 Copyright 1987-2009 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor – Cyberspace Law & Policy Centre @ UNSW and at the ANU and the Uni. of Hong Kong http://www.rogerclarke.com/ID/IdModel-090605 {.html,.ppt} http://www.rogerclarke.com/ID/IdModelGloss.html IDIS 2009 – Workshop on Identity in the Information Society LSE – 5 June 2009 A Sufficiently Rich Model of (Id)entity, Authentication and Authorisation

2 Copyright 1987-2009 2 A Dialect to Support Discourse on 'Identity in the Information Society' AGENDA Preliminaries The Model The Basic Model Identity, Identifier; Entity, Entifier; Nym Sample Applications (Id)entification Authentication Authorisation Applications of the Model

3 Copyright 1987-2009 3

4 Copyright 1987-2009 4 Preliminaries Deep discourse in a domain needs a specialist dialect Sufficient richness involves about 50 concepts and relationships among the concepts 50 neologisms is too much, so use existing terms Existing terms carry a lot of baggage Each term: requires explicit definition must be related to other terms in the model For each term, the specialist meaning will conflict with the (in most cases, many) existing usages

5 Copyright 1987-2009 5 Names Codes Roles Identity and Identifier

6 Copyright 1987-2009 6 The Entity/ies underlying an Identity

7 Copyright 1987-2009 7 Entity and Entifier

8 Copyright 1987-2009 8 Nymity

9 Copyright 1987-2009 9

10 Copyright 1987-2009 10 (Id)entification Identification The process of associating data with a particular Identity Achieved by acquiring an Identifier for the Identity

11 Copyright 1987-2009 11 (Id)entification Identification The process of associating data with a particular Identity Achieved by acquiring an Identifier for the Identity Entification The process of associating data with a particular Entity Achieved by acquiring an Entifier for the Entity

12 Copyright 1987-2009 12 (Id)entification Identification The process of associating data with a particular Identity Achieved by acquiring an Identifier for the Identity Entification The process of associating data with a particular Entity Achieved by acquiring an Entifier for the Entity Token A recording medium for an Entifier or Identifier Identity Silo A restricted-purpose Identity, and associated Identifier(s)

13 Copyright 1987-2009 13 Authentication of Assertions Authentication: A process that establishes a level of confidence in an Assertion Assertion: a proposition relating to... Assertion Types: a fact, the quality of a Data- item, the value of an Entity, the Location of an Entity, an Attribute of an Entity or an Identity, an Entity, or an Identity

14 Copyright 1987-2009 14 Authentication of Assertions Authentication: A process that establishes a level of confidence in an Assertion Assertion: a proposition relating to... Assertion Types: a fact, the quality of a Data- item, the value of an Entity, the Location of an Entity, an Attribute of an Entity or an Identity, an Entity, or an Identity Authenticator: evidence... Credential: a physical or digital Authenticator EOI: an Authenticator for Identity Assertions

15 Copyright 1987-2009 15 Authorisation

16 Copyright 1987-2009 16 Authorisation

17 Copyright 1987-2009 17 Authorisation: Access Control

18 Copyright 1987-2009 18 Applications Goods Packaging Animals Vehicles Devices Software Organisations Humans

19 Copyright 1987-2009 19 Proxies for Humans Goods Packaging Animals Vehicles Devices Software Organisations Humans Personal Goods Pets Personal Vehicles Personal Handhelds Reg-Code, IP-Address Embedded Chips

20 Copyright 1987-2009 20 Case 1 – Mobile Phones Entifier for the Product – model-name, model-number Entifier for the Handset – Serial-Number of the device Mobile Equipment Identity (IMEI) – GSM / UMTS Electronic Serial Number (ESN) or Mobile Equipment Identifier (MEID) – CDMA Identifier for the Persona – Serial-Number of a chip Subscriber Identity Module (SIM) – GSM / UMTS Removable User Identity Module (R-UIM) or CDMA Subscriber Identity Module (CSIM) – CDMA Universal Subscriber Identity Module (USIM) – 3G Proxy-(Id)entifier – MAC Address / NICId, or IP-Address

21 Copyright 1987-2009 21 Case 2 – Organisations Organisations are non-corporeal, 'shared hallucinations' 'Incorporation' is illusory A register-entry is evidence, not substantiation

22 Copyright 1987-2009 22 Case 2 – Organisations Organisations are non-corporeal, 'shared hallucinations' 'Incorporation' is illusory A register-entry is evidence, not substantiation Entifier name, registration-code Identifier business division, business name, brand, logo (Id)entity Authentication corporate seal?? signatures?? All 'corporate acts' are done by human agents, so...

23 Copyright 1987-2009 23 Case 3 – Humans

24 Copyright 1987-2009 24 Defined Terms in the Model entity, identity, anonymity, pseudonymity, nymity, attributes record, data item, digital persona, data silo (id)entifier, (id)entification, token, nym, anonym, pseudonym, identity silo, multi-purpose / general-purpose identifier authentication, authentication strength, assertion, assertion categories, authenticator, credential, (id)entity authentication, evidence of (id)entity, (id)entity credential authorisation/permission/privilege, user, loginid/userid/username, account, access control, registration, pre-authentication, enrolment, single sign-on, simplified sign-on, identity management

25 Copyright 1987-2009 25 A Dialect to Support Discourse on 'Identity in the Information Society' AGENDA Preliminaries The Model The Basic Model Identity, Identifier; Entity, Entifier; Nym Sample Applications (Id)entification Authentication Authorisation Applications of the Model

26 Copyright 1987-2009 26 Roger Clarke Xamax Consultancy, Canberra Visiting Professor – Cyberspace Law & Policy Centre @ UNSW and at the ANU and the Uni. of Hong Kong http://www.rogerclarke.com/ID/IdModel-090605 {.html,.ppt} http://www.rogerclarke.com/ID/IdModelGloss.html IDIS 2009 – Workshop on Identity in the Information Society LSE – 5 June 2009 A Sufficiently Rich Model of (Id)entity, Authentication and Authorisation


Download ppt "Copyright 1987-2009 1 Roger Clarke Xamax Consultancy, Canberra Visiting Professor – Cyberspace Law & Policy UNSW and at the ANU and the Uni. of."

Similar presentations


Ads by Google