Atnaujinkite slapukų nuostatas

El. knyga: Digital Identity Management: Technological, Business and Social Implications

Edited by
  • Formatas: 280 pages
  • Išleidimo metai: 02-Mar-2017
  • Leidėjas: Routledge
  • Kalba: eng
  • ISBN-13: 9781351944120
Kitos knygos pagal šią temą:
  • Formatas: 280 pages
  • Išleidimo metai: 02-Mar-2017
  • Leidėjas: Routledge
  • Kalba: eng
  • ISBN-13: 9781351944120
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

For almost every organization in the future, both public and private sector, identity management presents both significant opportunities and risks. Successfully managed, it will allow everyone to access products and services that are tailored to their needs and their behaviours. But successful management implies that organizations will have overcome the significant obstacles of security, individual human rights and social concern that could cause the whole process to become mired. Digital Identity Management, based on the work of the annual Digital Identity Forum in London, provides a wide perspective on the subject and explores the current technology available for identity management, its applications within business, and its significance in wider debates about identity, society and the law. This is an essential introduction for organizations seeking to use identity to get closer to customers; for those in government at all levels wrestling with online delivery of targeted services; as well as those concerned with the wider issues of identity, rights, the law, and the potential risks.

Recenzijos

I would recommend Digital Identity Management as a high level primer for senior managers who, without necessarily a background in IT, need to acquire an understanding of just how broad this topic is - and therefore that it does indeed have serious implications for almost all enterprises that deal with people and information about them. John Paschoud, Online Information Review

List of Figures xi
List of Tables xiii
Foreword XV
Peter Cochrane
Section 1 Introduction 1(9)
1 The Identity Vision
3(7)
David G.W. Birch
Identity Management Components
3(1)
Exploiting Technology
4(2)
Building Business Models
6(2)
The Evolution of Digital Identity
8(2)
Section 2 Identity Technologies 10(83)
2 Smart Cards, Smart Identities
11(12)
Andrew Henderson
The Implications of Mass Smart Card Use
11(1)
Stable Technology
12(2)
Business Implications
14(1)
Health Cards
15(1)
Social Implications
16(3)
Proven Technology
19(4)
Case Study: Estonian Electronic Identity Cards
20(1)
Taarvi Martens
3 A Roadmap for Biometrics
23(18)
John Elliott
Planning for Biometrics
23(1)
Technology Roadmapping
23(3)
A Real Example: Person Identification for Policing
26(3)
Status Check
29(2)
Fingerprint
31(1)
Iris
32(1)
Face
33(1)
DNA
34(1)
Conclusions
35(6)
Case Study: UK Visas
37(1)
Steve Inkpen
4 Identity Directories and Databases
41(12)
Alexis Scorer
Organizational Needs
41(1)
What is Identity Management?
42(1)
Components of Identity Management
43(1)
Enterprise Directory Services
43(4)
Developing an Identity Management Strategy
47(1)
Conclusions
48(5)
Case Study: US Department of Defense
50(1)
Alexis Scorer
5 Common Sense PKI
53(10)
John Madelin
The Changing Role of PKI
53(1)
Selection Criteria
54(1)
Certificate Authority
54(4)
Support for Today's Dynamic and Federated Business Models
58(1)
Conclusions
59(4)
Case Study: RDW
61(1)
John Madelin
6 Radio-Frequency Identification
63(10)
Cyrus Gilbert-Rolfe
Introduction
63(1)
RFID from Then until Now
64(1)
Gazillions of Tags
64(2)
Uniquely Identifying the Individual
66(1)
Looking Forward
67(6)
Case Study: Manchester City Football Club
68(1)
Duncan Martin
7 Practical Action: Federation and Mobility
73(20)
Paul Miller
Business Interests
73(1)
Liberty Alliance: Standards Make Markets
74(2)
Identity Theft: Scoping the Problem
76(4)
The Business of Identity
80(1)
Data Security...a Question of Damage Control
80(2)
Passwords...the Real Crisis
82(2)
Identity...A Best-of-Network Convergence
84(2)
Final Thoughts
86(9)
Case Study: Hong Kong's Smartics
89(1)
Raymond Wong
Section 3 Identity in Business and Government 93(80)
8 A Model for Digital Identity
95(10)
David G.W. Birch
Neil A. McEvoy
A Platform for Business
95(4)
Many to Many
99(1)
Shaping Infrastructure
100(1)
The Digital Identity Value Network
101(1)
Using Privacy
101(1)
Federal Solutions
102(1)
Model Solutions
103(2)
9 Large-Scale Identity Management
105(8)
Paul Mackinnon
Building Successful Implementations
105(1)
What Should IAM Provide?
106(1)
The Federated Model
106(1)
How Does Federation Work?
107(2)
What Do Customers Actually Want?
109(1)
IAM will Affect Everyone
110(1)
What Makes a Successful IAM System?
111(1)
Get Management Commitment
111(1)
Conclusion
112(1)
10 Two-Factor Authentication
113(8)
Richard Allen
Anthony Pickup
Authenticating Identity in Financial Services
113(1)
Something Must be Done (Really)
113(1)
Phish and Chips
113(5)
It's a Phix
118(3)
11 The Private Life of Things
121(8)
David G.W. Birch
Chips With Absolutely Everything
121(1)
The Identity of Stuff
122(2)
Protection and Provenance
124(1)
Adding Digital Identity
124(2)
Lost? What Do You Mean?
126(3)
12 Authentication in Business
129(10)
John Skipper
Federating Digital Identity at Population Scale
129(1)
The Benefits of Federated Identity
129(1)
Issues with Federated Identity
130(1)
Limitations of Federated Identity
131(1)
Authentication Network Models
132(1)
Conventional Federated Identity Models
132(1)
Integrated Identity - a New Model for Advanced Authentication
133(1)
Integrated Identity - Building the Business Case
133(1)
Evolving Population Scale Networks
134(1)
Managing Risk Through Multiple Credentials
135(1)
Understanding Your Customers
136(1)
Federated Identity versus Integrated Identity
136(1)
Towards Population-Scale Deployment
137(2)
13 Identity Services Infrastructure: Trust and Privacy in Communities of the Twenty-First Century
139(14)
Jon Shamah
The Role of ISI
139(2)
The Evolution Toward ISI
141(1)
ISI Fundamentals
141(1)
Standards
142(1)
Keys
142(1)
Ubiquitous Networks
142(1)
Privacy and Security
142(2)
Products and Services
144(1)
Implementing ISI
145(1)
Validation in ISI
146(1)
Distributed Architecture for ISI
146(1)
Corestreet's Secure Distributed Validation Design Principle
147(1)
The Benefits of Secure Distributed Validation
148(1)
The Corestreet Validation Infrastructure
149(1)
Corestreet Implementation Benefits
150(3)
Case Study: US Department of Defense
151(1)
Jon Shamah
14 The US-VISIT Program
153(10)
C. Maxine Most
Large-Scale Biometric Identity
153(1)
US-VISIT Program Development and Approach
154(2)
Privacy and Data Protection Implications
156(2)
Europe's Progress - Societal Factors are Key
158(1)
Practical Reality - Australia and Chile Border Control Solutions
159(1)
The Future of US-VISIT
160(3)
15 Building Privacy-Friendly RFID
163(10)
Toby Stevens
Potential for Misuse
163(1)
RFID Applications
164(1)
The Privacy Impact of RFID
164(1)
Managing RFID Risk
165(10)
Case Study: A Sample Code of Conduct
167(1)
Toby Stevens
Section 4 Digital Identity in Context 173(66)
16 The ID Problem
175(8)
Gareth Crossman
Digital Identity in Context
175(5)
Access to Public Services
180(3)
17 Planning ID Management in Government
183(10)
John Elliott
Identity Management and Uncertainty
183(1)
Modern Solutions
184(1)
Define the Service
184(2)
Framework for Interoperability
186(2)
Preparing for the Unknown
188(1)
The Rapid Pace of Change
188(1)
Practical Example: E-Passport
189(2)
Technology is Not the Problem
191(2)
18 ID and the Law
193(12)
Steve Philippsohn
Identity Fraud
193(1)
Current Legislation
194(8)
Passing Off
202(1)
Conclusion
203(2)
19 This is Not Your Father's ID Card
205(10)
David G.W. Birch
John Elliot
Neil A. McEvoy
Using Digital Identity
205(1)
The UK Direction
206(2)
Chips not Cardboard
208(1)
Identity
209(2)
Identity in Cyberspace
211(4)
20 Eavesdropping on the Future of Identity
215(12)
David G.W. Birch
Aleks Krotoski
Digital Identity in an Online World
215(1)
Virtual Worlds
216(3)
Virtual Property
219(2)
Virtual Identity
221(2)
Digital Divisions
223(4)
21 Cyborg Identity
227(12)
Kevin Warwick
Introduction
227(1)
The 1998 Implant Experiment
228(1)
The 2002 Implant Experiment
229(2)
Experimentation
231(2)
Identity Issues
233(1)
Cyborg Enhancements
234(1)
Implications
235(1)
Conclusions
236(3)
Section 5 Where Next? 239(16)
22 Digital Identity Management Implications
241(14)
David G.W. Birch
John Elliot
Andrew Whitcombe
The Uneven Distribution
241(1)
Timeline
242(2)
Sector Analysis
244(2)
Connection Technologies
246(1)
Disconnection Technologies
247(1)
Processing Technologies
248(1)
Assessing Implications
249(1)
Coming Soon
249(1)
On the Horizon
250(2)
Tomorrow Morning
252(1)
The Key Implication is Choice
252(3)
Index 255
David G.W. Birch is a Director of Consult Hyperion, the IT management consultancy that specialises in electronic transactions, which he helped found after several years working as a consultant in Europe, the Far East and North America. A physicist by training, David has lectured on the impact of new communications technologies to MBA level. He is on the editorial boards of the European Business Review and Microsoft's Finance on Windows, and is a correspondent to the Journal of Internet Banking and Commerce. He has written for publications ranging from The Guardian to the Parliamentary IT Review and is a media commentator on electronic business, having appeared on BBC TV and radio, CNN and CNBC amongst others.