Atnaujinkite slapukų nuostatas

El. knyga: Digital Identity Management: Technological, Business and Social Implications [Taylor & Francis e-book]

Edited by
  • Formatas: 280 pages
  • Išleidimo metai: 23-May-2007
  • Leidėjas: Gower Publishing Ltd
  • ISBN-13: 9781315257792
Kitos knygos pagal šią temą:
  • Taylor & Francis e-book
  • Kaina: 161,57 €*
  • * this price gives unlimited concurrent access for unlimited time
  • Standartinė kaina: 230,81 €
  • Sutaupote 30%
  • Formatas: 280 pages
  • Išleidimo metai: 23-May-2007
  • Leidėjas: Gower Publishing Ltd
  • ISBN-13: 9781315257792
Kitos knygos pagal šią temą:
For almost every organization in the future, both public and private sector, identity management presents both significant opportunities and risks. Successfully managed, it will allow everyone to access products and services that are tailored to their needs and their behaviours. But successful management implies that organizations will have overcome the significant obstacles of security, individual human rights and social concern that could cause the whole process to become mired. Digital Identity Management, based on the work of the annual Digital Identity Forum in London, provides a wide perspective on the subject and explores the current technology available for identity management, its applications within business, and its significance in wider debates about identity, society and the law. This is an essential introduction for organizations seeking to use identity to get closer to customers; for those in government at all levels wrestling with online delivery of targeted services; as well as those concerned with the wider issues of identity, rights, the law, and the potential risks.
List of Figures xi
List of Tables xiii
Foreword by Peter Cochrane xv
Section 1 Introduction 1
1 The Identity Vision
3
David G.W. Birch
Identity Management Components
3
Exploiting Technology
4
Building Business Models
6
The Evolution of Digital Identity
8
Section 2 Identity Technologies 10
2 Smart Cards, Smart Identities
11
Andrew Henderson
The Implications of Mass Smart Card Use
11
Stable Technology
12
Business Implications
14
Health Cards
15
Social Implications
16
Proven Technology
19
Case Study: Estonian Electronic Identity Cards
20
Taarvi Martens
3 A Roadmap for Biometrics
23
John Elliott
Planning for Biometrics
23
Technology Roadmapping
23
A Real Example: Person Identification for Policing
26
Status Check
29
Fingerprint
31
Iris
32
Face
33
DNA
34
Conclusions
35
Case Study: UK Visas
37
Steve Inkpen
4 Identity Directories and Databases
41
Alexis Scorer
Organizational Needs
41
What is Identity Management?
42
Components of Identity Management
43
Enterprise Directory Services
43
Developing an Identity Management Strategy
47
Conclusions
48
Case Study: US Department of Defense
50
Alexis Scorer
5 Common Sense PKI
53
John Madelin
The Changing Role of PKI
53
Selection Criteria
54
Certificate Authority
54
Support for Today's Dynamic and Federated Business Models
58
Conclusions
59
Case Study: RDW
61
John Madelin
6 Radio-Frequency Identification
63
Cyrus Gilbert-Rolfe
Introduction
63
RFID from Then until Now
64
Gazillions of Tags
64
Uniquely Identifying the Individual
66
Looking Forward
67
Case Study: Manchester City Football Club
68
Duncan Martin
7 Practical Action: Federation and Mobility
73
Paul Miller
Business Interests
73
Liberty Alliance: Standards Make Markets
74
Identity Theft: Scoping the Problem
76
The Business of Identity
80
Data Security...a Question of Damage Control
80
Passwords...the Real Crisis
82
Identity...A Best-of-Network Convergence
84
Final Thoughts
86
Case Study: Hong Kong's Smarties
89
Raymond Wong
Section 3: Identity in Business and Government 93
8 A Model for Digital Identity
95
David G.W. Birch and Neil A. McEvoy
A Platform for Business
95
Many to Many
99
Shaping Infrastructure
100
The Digital Identity Value Network
101
Using Privacy
101
Federal Solutions
102
Model Solutions
103
9 Large-Scale Identity Management
105
Paul Mackinnon
Building Successful Implementations
105
What Should IAM Provide?
106
The Federated Model
106
How Does Federation Work?
107
What Do Customers Actually Want?
109
IAM will Affect Everyone
110
What Makes a Successful IAM System?
111
Get Management Commitment
111
Conclusion
112
10 Two-Factor Authentication
113
Richard Allen and Anthony Pickup
Authenticating Identity in Financial Services
113
Something Must be Done (Really)
113
Phish and Chips
113
It's a Phix
118
11 The Private Life of Things
121
David G.W. Birch
Chips With Absolutely Everything
121
The Identity of Stuff
122
Protection and Provenance
124
Adding Digital Identity
124
Lost? What Do You Mean?
126
12 Authentication in Business
129
John Skipper
Federating Digital Identity at Population Scale
129
The Benefits of Federated Identity
129
Issues with Federated Identity
130
Limitations of Federated Identity
131
Authentication Network Models
132
Conventional Federated Identity Models
132
Integrated Identity – a New Model for Advanced Authentication
133
Integrated Identity – Building the Business Case
133
Evolving Population Scale Networks
134
Managing Risk Through Multiple Credentials
135
Understanding Your Customers
136
Federated Identity versus Integrated Identity
136
Towards Population-Scale Deployment
137
13 Identity Services Infrastructure: Trust and Privacy in Communities of the Twenty-First Century
139
Jon Shamah
The Role of 1ST
139
The Evolution Toward ISI
141
ISI Fundamentals
141
Standards
142
Keys
142
Ubiquitous Networks
142
Privacy and Security
142
Products and Services
144
Implementing ISI
145
Validation in ISI
146
Distributed Architecture for ISI
146
Corestreet's Secure Distributed Validation Design Principle
147
The Benefits of Secure Distributed Validation
148
The Corestreet Validation Infrastructure
149
Corestreet Implementation Benefits
150
Case Study: US Department of Defense
151
Jon Shamah
14 The US-VISIT Program
153
C. Maxine Most
Large-Scale Biometric Identity
153
US-VISIT Program Development and Approach
154
Privacy and Data Protection Implications
156
Europe's Progress – Societal Factors are Key
158
Practical Reality – Australia and Chile Border Control Solutions
159
The Future of US-VISIT
160
15 Building Privacy-Friendly RFID
163
Toby Stevens
Potential for Misuse
163
RFID Applications
164
The Privacy Impact of RFID
164
Managing RFID Risk
165
Case Study: A Sample Code of Conduct
167
Toby Stevens
Section 4: Digital Identity in Context 173
16 The ID Problem
175
Gareth Crossman
Digital Identity in Context
175
Access to Public Services
180
17 Planning ID Management in Government
183
John Elliott
Identity Management and Uncertainty
183
Modern Solutions
184
Define the Service
184
Framework for Interoperability
186
Preparing for the Unknown
188
The Rapid Pace of Change
188
Practical Example: E-Passport
189
Technology is Not the Problem
191
18 ID and the Law
193
Steve Philippsohn
Identity Fraud
193
Current Legislation
194
Passing Off
202
Conclusion
203
19 This is Not Your Father's ID Card
205
David G.W. Birch, John Elliot and Neil A. McEvoy
Using Digital Identity
205
The UK Direction
206
Chips not Cardboard
208
Identity
209
Identity in Cyberspace
211
20 Eavesdropping on the Future of Identity
215
David G.W. Birch and Aleks Krotoski
Digital Identity in an Online World
215
Virtual Worlds
216
Virtual Property
219
Virtual Identity
221
Digital Divisions
223
21 Cyborg Identity
227
Kevin Warwick
Introduction
227
The 1998 Implant Experiment
228
The 2002 Implant Experiment
229
Experimentation
231
Identity Issues
233
Cyborg Enhancements
234
Implications
235
Conclusions
236
Section 5: Where Next? 239
22 Digital Identity Management Implications
241
David G.W. Birch, John Elliot and Andrew Whitcombe
The Uneven Distribution
241
Timeline
242
Sector Analysis
244
Connection Technologies
246
Disconnection Technologies
247
Processing Technologies
248
Assessing Implications
249
Coming Soon
249
On the Horizon
250
Tomorrow Morning
252
The Key Implication is Choice
252
Index 255
David G.W. Birch is a Director of Consult Hyperion, the IT management consultancy that specialises in electronic transactions, which he helped found after several years working as a consultant in Europe, the Far East and North America. A physicist by training, David has lectured on the impact of new communications technologies to MBA level. He is on the editorial boards of the European Business Review and Microsoft's Finance on Windows, and is a correspondent to the Journal of Internet Banking and Commerce. He has written for publications ranging from The Guardian to the Parliamentary IT Review and is a media commentator on electronic business, having appeared on BBC TV and radio, CNN and CNBC amongst others.