[Chapter-delegates] Microsoft proposes an Internet Licensing System and a World Health Organization for the Internet
Lucy Lynch
lynch at isoc.org
Sun Mar 14 12:36:22 PDT 2010
On Fri, 12 Mar 2010, Zaid Ali wrote:
> I think the most constructive involvement from ISOC would be to raise this
> in the Trust and Identity initiative. Discussions like this raise a
> fundamental question "What do we want the Internet trust model/architecture
> to be in the next 10 or 20 years?" The SF INET is actually exploring this as
> the theme on May 7th.
As Veni and Joly have already pointed out, there will be a mix
of interesting use cases for managed identity in a number of
different contexts including e-gov.
I suspect the Microsoft messages have something to to do with the recent
release of their U-prove code under an open development license and their
hopes for broad deployment of claims based (information card) solutions
already embedded in their Vista line.
For a good over-view of some of the current options in authentication see:
http://download.safelayer.com/open/RD/en/PrivacyFeaturesOfAuthenticationSystems.pdf
"Privacy Features of Authentication Systems
J. Herranz°, J. Iñigo*, H. Pujol*
ºDepartament de Matemàtica Aplicada IV, Universitat Politècnica de
Catalunya
*Safelayer Secure Communications, S.A.
Abstract. The wide variety of online services that appear every day offers
new scenarios where privacy of citizens is concerned. In many cases, there
are two apparently contradictory goals when dealing with the access to an
online service. On the one hand, security of the service must be ensured,
meaning that nonauthorized users will not gain access to the service. On
the other hand, the personal information that a user discloses when he
requests access to the service must be minimal.
In the last years, some authentication systems offering different levels
of privacy and anonymity have been proposed. In this paper we review the
state of the art in this area. We describe a very generic and common
architecture for these systems, we list different (privacy) properties
that authentication systems may provide, and we discuss which of these
properties are satisfied by some of the existing systems. Keywords:
digital authentication, anonymity, authorisation, cryptography, privacy,
web 2.0."
- Lucy
> Zaid
>
>
> On 3/12/10 3:24 PM, "Joly MacFie" <joly at punkcast.com> wrote:
>
>> Well, IMHO this article is predominantly FUD.
>>
>> However digital signatures are an approaching fact of life, and will
>> no doubt be tied in to national id systems in many countries.
>>
>> As to the suggestion that we would need alternate 'trusted' machines i
>> believe that some kind of architecture that achieves the same end, a
>> virtual public network if you will, is not such an outrageous
>> suggestion.
>>
>> Neither idea is mutually exclusive to the Internet Model.
>>
>> j
>>
>> On Fri, Mar 12, 2010 at 4:06 PM, Sivasubramanian Muthusamy
>> <isolatedn at gmail.com> wrote:
>>> Hello,
>>>
>>> Can't ISOC reach out to the sensible ones within Microsoft to dispel this
>>> nonsense from Craig Mundi, Microsoft's chief research and strategy officer?
>>>
>>> http://www.globalresearch.ca/index.php?context=va&aid=17433
>>>
>>> Or, perhaps, this anti-internet advocacy be considered a reflection of
>>> Microsoft's corporate thinking?
>>>
>>>
>>> Sivasubramanian Muthusamy
>>> http://www.isocmadras.com
>>> facebook: http://is.gd/x8Sh
>>> LinkedIn: http://is.gd/x8U6
>>> Twitter: http://is.gd/x8Vz
>>>
>>>
>>>
>>> _______________________________________________
>>> Chapter-delegates mailing list
>>> Chapter-delegates at elists.isoc.org
>>> http://elists.isoc.org/mailman/listinfo/chapter-delegates
>>>
>>>
>>
>>
>
>
> _______________________________________________
> Chapter-delegates mailing list
> Chapter-delegates at elists.isoc.org
> http://elists.isoc.org/mailman/listinfo/chapter-delegates
>
More information about the Chapter-delegates
mailing list