This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
March/April 2008 (vol. 6 no. 2)
pp. 13-15
Susan Landau, Sun Microsystems
Deirdre K. Mulligan, University of California, Berkeley
In considering identity management, the first issue is—What is identity? This is, of course, an issue that has plagued poets, philosophers, and playwrights for centuries. We're concerned with a more prosaic version of the question: How does an entity recognize another entity? This important question occurs when access to resources, such as health or financial records, services, or benefits, is limited to specific entities. The entity in question could be a person, a computer, or even a device with quite limited memory and computational power. In this issue of IEEE Security & Privacy—the first of what we suspect will be several special issues on identity management—we have chosen to focus on identity management in which the entity being identified is a person.

1. Emily Dickinson, Collected Poems of Emily Dickinson, Thomas H. Johnson, ed., Little, Brown and Company, 1960, p. 133.
2. T. Macchius Plautus, Menaechmi, third century BC.
3. W. Shakespeare, Twelfth Night, 1623.

Index Terms:
identity theft, identity management, computer security,
Citation:
Susan Landau, Deirdre K. Mulligan, "I'm Pc01002/SpringPeeper/ED288l.6; Who are You?," IEEE Security & Privacy, vol. 6, no. 2, pp. 13-15, March-April 2008, doi:10.1109/MSP.2008.34
Usage of this product signifies your acceptance of the Terms of Use.