List of Figures |
|
xi | |
List of Tables |
|
xiii | |
Foreword by Peter Cochrane |
|
xv | |
Section 1 Introduction |
|
1 | |
|
|
3 | |
|
|
|
Identity Management Components |
|
|
3 | |
|
|
4 | |
|
|
6 | |
|
The Evolution of Digital Identity |
|
|
8 | |
Section 2 Identity Technologies |
|
10 | |
|
2 Smart Cards, Smart Identities |
|
|
11 | |
|
|
|
The Implications of Mass Smart Card Use |
|
|
11 | |
|
|
12 | |
|
|
14 | |
|
|
15 | |
|
|
16 | |
|
|
19 | |
|
Case Study: Estonian Electronic Identity Cards |
|
|
20 | |
|
|
|
3 A Roadmap for Biometrics |
|
|
23 | |
|
|
|
|
23 | |
|
|
23 | |
|
A Real Example: Person Identification for Policing |
|
|
26 | |
|
|
29 | |
|
|
31 | |
|
|
32 | |
|
|
33 | |
|
|
34 | |
|
|
35 | |
|
|
37 | |
|
|
|
4 Identity Directories and Databases |
|
|
41 | |
|
|
|
|
41 | |
|
What is Identity Management? |
|
|
42 | |
|
Components of Identity Management |
|
|
43 | |
|
Enterprise Directory Services |
|
|
43 | |
|
Developing an Identity Management Strategy |
|
|
47 | |
|
|
48 | |
|
Case Study: US Department of Defense |
|
|
50 | |
|
|
|
|
53 | |
|
|
|
|
53 | |
|
|
54 | |
|
|
54 | |
|
Support for Today's Dynamic and Federated Business Models |
|
|
58 | |
|
|
59 | |
|
|
61 | |
|
|
|
6 Radio-Frequency Identification |
|
|
63 | |
|
|
|
|
63 | |
|
|
64 | |
|
|
64 | |
|
Uniquely Identifying the Individual |
|
|
66 | |
|
|
67 | |
|
Case Study: Manchester City Football Club |
|
|
68 | |
|
|
|
7 Practical Action: Federation and Mobility |
|
|
73 | |
|
|
|
|
73 | |
|
Liberty Alliance: Standards Make Markets |
|
|
74 | |
|
Identity Theft: Scoping the Problem |
|
|
76 | |
|
|
80 | |
|
Data Security...a Question of Damage Control |
|
|
80 | |
|
Passwords...the Real Crisis |
|
|
82 | |
|
Identity...A Best-of-Network Convergence |
|
|
84 | |
|
|
86 | |
|
Case Study: Hong Kong's Smarties |
|
|
89 | |
|
|
Section 3: Identity in Business and Government |
|
93 | |
|
8 A Model for Digital Identity |
|
|
95 | |
|
David G.W. Birch and Neil A. McEvoy |
|
|
|
|
95 | |
|
|
99 | |
|
|
100 | |
|
The Digital Identity Value Network |
|
|
101 | |
|
|
101 | |
|
|
102 | |
|
|
103 | |
|
9 Large-Scale Identity Management |
|
|
105 | |
|
|
|
Building Successful Implementations |
|
|
105 | |
|
|
106 | |
|
|
106 | |
|
How Does Federation Work? |
|
|
107 | |
|
What Do Customers Actually Want? |
|
|
109 | |
|
|
110 | |
|
What Makes a Successful IAM System? |
|
|
111 | |
|
Get Management Commitment |
|
|
111 | |
|
|
112 | |
|
10 Two-Factor Authentication |
|
|
113 | |
|
Richard Allen and Anthony Pickup |
|
|
|
Authenticating Identity in Financial Services |
|
|
113 | |
|
Something Must be Done (Really) |
|
|
113 | |
|
|
113 | |
|
|
118 | |
|
11 The Private Life of Things |
|
|
121 | |
|
|
|
Chips With Absolutely Everything |
|
|
121 | |
|
|
122 | |
|
Protection and Provenance |
|
|
124 | |
|
|
124 | |
|
|
126 | |
|
12 Authentication in Business |
|
|
129 | |
|
|
|
Federating Digital Identity at Population Scale |
|
|
129 | |
|
The Benefits of Federated Identity |
|
|
129 | |
|
Issues with Federated Identity |
|
|
130 | |
|
Limitations of Federated Identity |
|
|
131 | |
|
Authentication Network Models |
|
|
132 | |
|
Conventional Federated Identity Models |
|
|
132 | |
|
Integrated Identity a New Model for Advanced Authentication |
|
|
133 | |
|
Integrated Identity Building the Business Case |
|
|
133 | |
|
Evolving Population Scale Networks |
|
|
134 | |
|
Managing Risk Through Multiple Credentials |
|
|
135 | |
|
Understanding Your Customers |
|
|
136 | |
|
Federated Identity versus Integrated Identity |
|
|
136 | |
|
Towards Population-Scale Deployment |
|
|
137 | |
|
13 Identity Services Infrastructure: Trust and Privacy in Communities of the Twenty-First Century |
|
|
139 | |
|
|
|
|
139 | |
|
|
141 | |
|
|
141 | |
|
|
142 | |
|
|
142 | |
|
|
142 | |
|
|
142 | |
|
|
144 | |
|
|
145 | |
|
|
146 | |
|
Distributed Architecture for ISI |
|
|
146 | |
|
Corestreet's Secure Distributed Validation Design Principle |
|
|
147 | |
|
The Benefits of Secure Distributed Validation |
|
|
148 | |
|
The Corestreet Validation Infrastructure |
|
|
149 | |
|
Corestreet Implementation Benefits |
|
|
150 | |
|
Case Study: US Department of Defense |
|
|
151 | |
|
|
|
|
153 | |
|
|
|
Large-Scale Biometric Identity |
|
|
153 | |
|
US-VISIT Program Development and Approach |
|
|
154 | |
|
Privacy and Data Protection Implications |
|
|
156 | |
|
Europe's Progress Societal Factors are Key |
|
|
158 | |
|
Practical Reality Australia and Chile Border Control Solutions |
|
|
159 | |
|
|
160 | |
|
15 Building Privacy-Friendly RFID |
|
|
163 | |
|
|
|
|
163 | |
|
|
164 | |
|
The Privacy Impact of RFID |
|
|
164 | |
|
|
165 | |
|
Case Study: A Sample Code of Conduct |
|
|
167 | |
|
|
Section 4: Digital Identity in Context |
|
173 | |
|
|
175 | |
|
|
|
Digital Identity in Context |
|
|
175 | |
|
Access to Public Services |
|
|
180 | |
|
17 Planning ID Management in Government |
|
|
183 | |
|
|
|
Identity Management and Uncertainty |
|
|
183 | |
|
|
184 | |
|
|
184 | |
|
Framework for Interoperability |
|
|
186 | |
|
Preparing for the Unknown |
|
|
188 | |
|
|
188 | |
|
Practical Example: E-Passport |
|
|
189 | |
|
Technology is Not the Problem |
|
|
191 | |
|
|
193 | |
|
|
|
|
193 | |
|
|
194 | |
|
|
202 | |
|
|
203 | |
|
19 This is Not Your Father's ID Card |
|
|
205 | |
|
David G.W. Birch, John Elliot and Neil A. McEvoy |
|
|
|
|
205 | |
|
|
206 | |
|
|
208 | |
|
|
209 | |
|
|
211 | |
|
20 Eavesdropping on the Future of Identity |
|
|
215 | |
|
David G.W. Birch and Aleks Krotoski |
|
|
|
Digital Identity in an Online World |
|
|
215 | |
|
|
216 | |
|
|
219 | |
|
|
221 | |
|
|
223 | |
|
|
227 | |
|
|
|
|
227 | |
|
The 1998 Implant Experiment |
|
|
228 | |
|
The 2002 Implant Experiment |
|
|
229 | |
|
|
231 | |
|
|
233 | |
|
|
234 | |
|
|
235 | |
|
|
236 | |
Section 5: Where Next? |
|
239 | |
|
22 Digital Identity Management Implications |
|
|
241 | |
|
David G.W. Birch, John Elliot and Andrew Whitcombe |
|
|
|
|
241 | |
|
|
242 | |
|
|
244 | |
|
|
246 | |
|
Disconnection Technologies |
|
|
247 | |
|
|
248 | |
|
|
249 | |
|
|
249 | |
|
|
250 | |
|
|
252 | |
|
The Key Implication is Choice |
|
|
252 | |
Index |
|
255 | |