Resources
Resources provides a directory of educational materials and community-support tools for IDTrust.
"Identity 2.0" and other e-Identity Resources
This self-styled headquarters for the so-called Identity 2.0 movement is managed by sxip, and led by Dick Hardt.
A Case for Collaborative Identity Management in a Complex Decentralized Environment
Spotlight On Identity Management: A Case for Collaborative Identity Management in a Complex Decentralized Environment
Using the identity life cycle of the Cornell student as a use case, we will
discuss the value of approaching identity management as a collective
responsibility. The business and IT sides of the house must partner to meet
rising expectations for streamlined access to information in a world where
services are distributed not only across multiple campus units but also across
multiple institutions. See more...
A Survey of Trust and Reputation Systems for Online Service Provision
Trust and reputation systems represent a significant trend in decision support for Internet mediated service provision. The basic idea is to let parties rate each other, for example after the completion of a transaction, and use the aggregated ratings about a given party to derive a trust or reputation score, which can assist other parties in deciding whether or not to transact with that party in the future. A natural side effect is that it also provides an incentive for good behaviour, and therefore tends to have a positive effect on market quality.
Asia regional PKI Fora
- Asia PKI Consortium (APKIC, formerly the Asia PKI Forum)
- China PKI Forum
- Japan PKI Forum
-
Taiwan's PKI Interoperability
Management and Promotion Program - Macao's eSignTrust CA (a Princpal Member of the APKIC.
Bill Burr's "Electronic Authentication in the U.S. Federal Government"
This presentation was made by Bill Burr of the National Institute of Standards and Technology to the Asia PKI Forum, Tokyo, 2005.
Biometrics and PKI
This original PKI Note published by the erstwhile PKI Forum states, "Authentication can be performed with three approaches: knowledge factor (something the individual knows), possession factor (something the individual has), or biometric factor (something physiologically unique about the individual). Biometric technology uses a measurable biological or behavioral characteristic to reliably distinguish one person from another. Biometrics can enhance PKI technology, and, symbiotically, PKI technology can secure biometric technology.
Current development of WPKI in Chinese Taipei
This comprehensive presentation of Wireless PKI developments in Taiwan includes a comparison with WAP (Wireless Application Protocol), details of infrastructure, and important applications. The presentation was made by the Chinese Taipei PKI Forum.
Dartmouth College PKI Lab Web Site
Dartmouth College with support from the Mellon Foundation is working to develop use of Public Key Infrastructure in Academic Computing. There are many potential applications for PKI in an academic setting. There are also many obstacles to be overcome in order to provide PKI based services broadly in the standard network computing environment.
Digital Signature Tutorial
From the American Bar Association, in connection with the ABA's pioneering and highly influential Digital Signature and PKI Guidelines.
INTRODUCTION
Electronic Authentication: Issues Relating to its Selection and Use
A major output (2002) of the eSecurity Task Group of the APEC Telecommunications and Information Working Group - a comprehensive atlas of the policy and inter-government issues relating to authentication and "trust".
EXECUTIVE SUMMARY