The Community for Technology Leaders
RSS Icon
Issue No.05 - September/October (2009 vol.7)
pp: 56-59
Scott Charney , Microsoft
The author proposes that we must significantly improve how we authenticate ourselves on various computer systems to address growing security and privacy threats. As part of that process, we must adopt an identity metasystem that relies on in-person proofing and the passing of identity claims (such as claims about name, age, residency, or any other identity attribute). When people and organizations have the ability to transmit and consume such claims, they will be better able to engage safely in personal and commercial transactions.
On the horizon, identity, authentication, security, privacy, cybercrime, identity metasystem, in person proofing, anonymity
Scott Charney, "The Evolution of Online Identity", IEEE Security & Privacy, vol.7, no. 5, pp. 56-59, September/October 2009, doi:10.1109/MSP.2009.140
20 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool