List of Figures |
|
xi | |
List of Tables |
|
xiii | |
Foreword |
|
XV | |
|
Section 1 Introduction |
|
1 | (9) |
|
|
3 | (7) |
|
|
Identity Management Components |
|
|
3 | (1) |
|
|
4 | (2) |
|
|
6 | (2) |
|
The Evolution of Digital Identity |
|
|
8 | (2) |
Section 2 Identity Technologies |
|
10 | (83) |
|
2 Smart Cards, Smart Identities |
|
|
11 | (12) |
|
|
The Implications of Mass Smart Card Use |
|
|
11 | (1) |
|
|
12 | (2) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
16 | (3) |
|
|
19 | (4) |
|
Case Study: Estonian Electronic Identity Cards |
|
|
20 | (1) |
|
|
3 A Roadmap for Biometrics |
|
|
23 | (18) |
|
|
|
23 | (1) |
|
|
23 | (3) |
|
A Real Example: Person Identification for Policing |
|
|
26 | (3) |
|
|
29 | (2) |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
35 | (6) |
|
|
37 | (1) |
|
|
4 Identity Directories and Databases |
|
|
41 | (12) |
|
|
|
41 | (1) |
|
What is Identity Management? |
|
|
42 | (1) |
|
Components of Identity Management |
|
|
43 | (1) |
|
Enterprise Directory Services |
|
|
43 | (4) |
|
Developing an Identity Management Strategy |
|
|
47 | (1) |
|
|
48 | (5) |
|
Case Study: US Department of Defense |
|
|
50 | (1) |
|
|
|
53 | (10) |
|
|
|
53 | (1) |
|
|
54 | (1) |
|
|
54 | (4) |
|
Support for Today's Dynamic and Federated Business Models |
|
|
58 | (1) |
|
|
59 | (4) |
|
|
61 | (1) |
|
|
6 Radio-Frequency Identification |
|
|
63 | (10) |
|
|
|
63 | (1) |
|
|
64 | (1) |
|
|
64 | (2) |
|
Uniquely Identifying the Individual |
|
|
66 | (1) |
|
|
67 | (6) |
|
Case Study: Manchester City Football Club |
|
|
68 | (1) |
|
|
7 Practical Action: Federation and Mobility |
|
|
73 | (20) |
|
|
|
73 | (1) |
|
Liberty Alliance: Standards Make Markets |
|
|
74 | (2) |
|
Identity Theft: Scoping the Problem |
|
|
76 | (4) |
|
|
80 | (1) |
|
Data Security...a Question of Damage Control |
|
|
80 | (2) |
|
Passwords...the Real Crisis |
|
|
82 | (2) |
|
Identity...A Best-of-Network Convergence |
|
|
84 | (2) |
|
|
86 | (9) |
|
Case Study: Hong Kong's Smartics |
|
|
89 | (1) |
|
Section 3 Identity in Business and Government |
|
93 | (80) |
|
8 A Model for Digital Identity |
|
|
95 | (10) |
|
|
|
|
95 | (4) |
|
|
99 | (1) |
|
|
100 | (1) |
|
The Digital Identity Value Network |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
103 | (2) |
|
9 Large-Scale Identity Management |
|
|
105 | (8) |
|
|
Building Successful Implementations |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
106 | (1) |
|
How Does Federation Work? |
|
|
107 | (2) |
|
What Do Customers Actually Want? |
|
|
109 | (1) |
|
|
110 | (1) |
|
What Makes a Successful IAM System? |
|
|
111 | (1) |
|
Get Management Commitment |
|
|
111 | (1) |
|
|
112 | (1) |
|
10 Two-Factor Authentication |
|
|
113 | (8) |
|
|
|
Authenticating Identity in Financial Services |
|
|
113 | (1) |
|
Something Must be Done (Really) |
|
|
113 | (1) |
|
|
113 | (5) |
|
|
118 | (3) |
|
11 The Private Life of Things |
|
|
121 | (8) |
|
|
Chips With Absolutely Everything |
|
|
121 | (1) |
|
|
122 | (2) |
|
Protection and Provenance |
|
|
124 | (1) |
|
|
124 | (2) |
|
|
126 | (3) |
|
12 Authentication in Business |
|
|
129 | (10) |
|
|
Federating Digital Identity at Population Scale |
|
|
129 | (1) |
|
The Benefits of Federated Identity |
|
|
129 | (1) |
|
Issues with Federated Identity |
|
|
130 | (1) |
|
Limitations of Federated Identity |
|
|
131 | (1) |
|
Authentication Network Models |
|
|
132 | (1) |
|
Conventional Federated Identity Models |
|
|
132 | (1) |
|
Integrated Identity - a New Model for Advanced Authentication |
|
|
133 | (1) |
|
Integrated Identity - Building the Business Case |
|
|
133 | (1) |
|
Evolving Population Scale Networks |
|
|
134 | (1) |
|
Managing Risk Through Multiple Credentials |
|
|
135 | (1) |
|
Understanding Your Customers |
|
|
136 | (1) |
|
Federated Identity versus Integrated Identity |
|
|
136 | (1) |
|
Towards Population-Scale Deployment |
|
|
137 | (2) |
|
13 Identity Services Infrastructure: Trust and Privacy in Communities of the Twenty-First Century |
|
|
139 | (14) |
|
|
|
139 | (2) |
|
|
141 | (1) |
|
|
141 | (1) |
|
|
142 | (1) |
|
|
142 | (1) |
|
|
142 | (1) |
|
|
142 | (2) |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
146 | (1) |
|
Distributed Architecture for ISI |
|
|
146 | (1) |
|
Corestreet's Secure Distributed Validation Design Principle |
|
|
147 | (1) |
|
The Benefits of Secure Distributed Validation |
|
|
148 | (1) |
|
The Corestreet Validation Infrastructure |
|
|
149 | (1) |
|
Corestreet Implementation Benefits |
|
|
150 | (3) |
|
Case Study: US Department of Defense |
|
|
151 | (1) |
|
|
|
153 | (10) |
|
|
Large-Scale Biometric Identity |
|
|
153 | (1) |
|
US-VISIT Program Development and Approach |
|
|
154 | (2) |
|
Privacy and Data Protection Implications |
|
|
156 | (2) |
|
Europe's Progress - Societal Factors are Key |
|
|
158 | (1) |
|
Practical Reality - Australia and Chile Border Control Solutions |
|
|
159 | (1) |
|
|
160 | (3) |
|
15 Building Privacy-Friendly RFID |
|
|
163 | (10) |
|
|
|
163 | (1) |
|
|
164 | (1) |
|
The Privacy Impact of RFID |
|
|
164 | (1) |
|
|
165 | (10) |
|
Case Study: A Sample Code of Conduct |
|
|
167 | (1) |
|
Section 4 Digital Identity in Context |
|
173 | (66) |
|
|
175 | (8) |
|
|
Digital Identity in Context |
|
|
175 | (5) |
|
Access to Public Services |
|
|
180 | (3) |
|
17 Planning ID Management in Government |
|
|
183 | (10) |
|
|
Identity Management and Uncertainty |
|
|
183 | (1) |
|
|
184 | (1) |
|
|
184 | (2) |
|
Framework for Interoperability |
|
|
186 | (2) |
|
Preparing for the Unknown |
|
|
188 | (1) |
|
|
188 | (1) |
|
Practical Example: E-Passport |
|
|
189 | (2) |
|
Technology is Not the Problem |
|
|
191 | (2) |
|
|
193 | (12) |
|
|
|
193 | (1) |
|
|
194 | (8) |
|
|
202 | (1) |
|
|
203 | (2) |
|
19 This is Not Your Father's ID Card |
|
|
205 | (10) |
|
|
|
|
|
205 | (1) |
|
|
206 | (2) |
|
|
208 | (1) |
|
|
209 | (2) |
|
|
211 | (4) |
|
20 Eavesdropping on the Future of Identity |
|
|
215 | (12) |
|
|
|
Digital Identity in an Online World |
|
|
215 | (1) |
|
|
216 | (3) |
|
|
219 | (2) |
|
|
221 | (2) |
|
|
223 | (4) |
|
|
227 | (12) |
|
|
|
227 | (1) |
|
The 1998 Implant Experiment |
|
|
228 | (1) |
|
The 2002 Implant Experiment |
|
|
229 | (2) |
|
|
231 | (2) |
|
|
233 | (1) |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
236 | (3) |
Section 5 Where Next? |
|
239 | (16) |
|
22 Digital Identity Management Implications |
|
|
241 | (14) |
|
|
|
|
|
241 | (1) |
|
|
242 | (2) |
|
|
244 | (2) |
|
|
246 | (1) |
|
Disconnection Technologies |
|
|
247 | (1) |
|
|
248 | (1) |
|
|
249 | (1) |
|
|
249 | (1) |
|
|
250 | (2) |
|
|
252 | (1) |
|
The Key Implication is Choice |
|
|
252 | (3) |
Index |
|
255 | |