The Community for Technology Leaders
RSS Icon
Issue No.02 - March/April (2008 vol.6)
pp: 13-15
Susan Landau , Sun Microsystems
Deirdre K. Mulligan , University of California, Berkeley
In considering identity management, the first issue is—What is identity? This is, of course, an issue that has plagued poets, philosophers, and playwrights for centuries. We're concerned with a more prosaic version of the question: How does an entity recognize another entity? This important question occurs when access to resources, such as health or financial records, services, or benefits, is limited to specific entities. The entity in question could be a person, a computer, or even a device with quite limited memory and computational power. In this issue of IEEE Security & Privacy—the first of what we suspect will be several special issues on identity management—we have chosen to focus on identity management in which the entity being identified is a person.
identity theft, identity management, computer security
Susan Landau, Deirdre K. Mulligan, "I'm Pc01002/SpringPeeper/ED288l.6; Who are You?", IEEE Security & Privacy, vol.6, no. 2, pp. 13-15, March/April 2008, doi:10.1109/MSP.2008.34
1. Emily Dickinson, Collected Poems of Emily Dickinson, Thomas H. Johnson, ed., Little, Brown and Company, 1960, p. 133.
2. T. Macchius Plautus, Menaechmi, third century BC.
3. W. Shakespeare, Twelfth Night, 1623.
28 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool