Resources

Add ResourceAdd Resource

Resources provides a directory of educational materials and community-support tools for IDTrust.

Resource Type

"Identity 2.0" and other e-Identity Resources

This self-styled headquarters for the so-called Identity 2.0 movement is managed by sxip, and led by Dick Hardt.

Read more

A Case for Collaborative Identity Management in a Complex Decentralized Environment

Spotlight On Identity Management: A Case for Collaborative Identity Management in a Complex Decentralized Environment

Using the identity life cycle of the Cornell student as a use case, we will discuss the value of approaching identity management as a collective responsibility. The business and IT sides of the house must partner to meet rising expectations for streamlined access to information in a world where services are distributed not only across multiple campus units but also across multiple institutions. See more...

Read more

A Survey of Trust and Reputation Systems for Online Service Provision

Trust and reputation systems represent a significant trend in decision support for Internet mediated service provision. The basic idea is to let parties rate each other, for example after the completion of a transaction, and use the aggregated ratings about a given party to derive a trust or reputation score, which can assist other parties in deciding whether or not to transact with that party in the future. A natural side effect is that it also provides an incentive for good behaviour, and therefore tends to have a positive effect on market quality.

Read more

Asia regional PKI Fora

  • Asia PKI Consortium (APKIC, formerly the Asia PKI Forum)
  • China PKI Forum
  • Japan PKI Forum
  • Taiwan's PKI Interoperability
    Management and Promotion Program
  • Macao's eSignTrust CA (a Princpal Member of the APKIC.

Read more

Bill Burr's "Electronic Authentication in the U.S. Federal Government"

This presentation was made by Bill Burr of the National Institute of Standards and Technology to the Asia PKI Forum, Tokyo, 2005.

Read more

Biometrics and PKI

This original PKI Note published by the erstwhile PKI Forum states, "Authentication can be performed with three approaches: knowledge factor (something the individual knows), possession factor (something the individual has), or biometric factor (something physiologically unique about the individual). Biometric technology uses a measurable biological or behavioral characteristic to reliably distinguish one person from another. Biometrics can enhance PKI technology, and, symbiotically, PKI technology can secure biometric technology.

Read more

Current development of WPKI in Chinese Taipei

This comprehensive presentation of Wireless PKI developments in Taiwan includes a comparison with WAP (Wireless Application Protocol), details of infrastructure, and important applications. The presentation was made by the Chinese Taipei PKI Forum.

Read more

Dartmouth College PKI Lab Web Site

Dartmouth College with support from the Mellon Foundation is working to develop use of Public Key Infrastructure in Academic Computing. There are many potential applications for PKI in an academic setting. There are also many obstacles to be overcome in order to provide PKI based services broadly in the standard network computing environment.

Read more

Digital Signature Tutorial

From the American Bar Association, in connection with the ABA's pioneering and highly influential Digital Signature and PKI Guidelines. 

INTRODUCTION

Read more

Electronic Authentication: Issues Relating to its Selection and Use

A major output (2002) of the eSecurity Task Group of the APEC Telecommunications and Information Working Group - a comprehensive atlas of the policy and inter-government issues relating to authentication and "trust". 

EXECUTIVE SUMMARY

Read more

XML.org Focus Areas: BPEL | DITA | ebXML | IDtrust | OpenDocument | SAML | UBL | UDDI
OASIS sites: OASIS | Cover Pages | XML.org | AMQP | CGM Open | eGov | Emergency | IDtrust | LegalXML | Open CSA | OSLC | WS-I