The Community for Technology Leaders
Green Image
Issue No. 05 - September/October (2009 vol. 7)
ISSN: 1540-7993
pp: 56-59
Scott Charney , Microsoft
The author proposes that we must significantly improve how we authenticate ourselves on various computer systems to address growing security and privacy threats. As part of that process, we must adopt an identity metasystem that relies on in-person proofing and the passing of identity claims (such as claims about name, age, residency, or any other identity attribute). When people and organizations have the ability to transmit and consume such claims, they will be better able to engage safely in personal and commercial transactions.
On the horizon, identity, authentication, security, privacy, cybercrime, identity metasystem, in person proofing, anonymity
Scott Charney, "The Evolution of Online Identity", IEEE Security & Privacy, vol. 7, no. , pp. 56-59, September/October 2009, doi:10.1109/MSP.2009.140
100 ms
(Ver 3.3 (11022016))