This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
The Evolution of Online Identity
September/October 2009 (vol. 7 no. 5)
pp. 56-59
Scott Charney, Microsoft
The author proposes that we must significantly improve how we authenticate ourselves on various computer systems to address growing security and privacy threats. As part of that process, we must adopt an identity metasystem that relies on in-person proofing and the passing of identity claims (such as claims about name, age, residency, or any other identity attribute). When people and organizations have the ability to transmit and consume such claims, they will be better able to engage safely in personal and commercial transactions.
Index Terms:
On the horizon, identity, authentication, security, privacy, cybercrime, identity metasystem, in person proofing, anonymity
Citation:
Scott Charney, "The Evolution of Online Identity," IEEE Security & Privacy, vol. 7, no. 5, pp. 56-59, Sept.-Oct. 2009, doi:10.1109/MSP.2009.140
Usage of this product signifies your acceptance of the Terms of Use.