Skip to main content

XRD Metadata to Make Digital Identity Less Visible and Foster Trusted Collaborations across Networked Computing Ecosystems

  • Conference paper
Networked Digital Technologies (NDT 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 136))

Included in the following conference series:

Abstract

Distributed computing ecosystems’ collaboration and mass integration between partners require extensive digital identities processing in order to better respond to services’ consumers. Such processing is increasingly implies loss of user’s control over identity, security risks and threads to privacy. Digital identity is represented by a set of linked and disparate documents distributed over computing ecosystems’ domains. We suggest an innovative approach based on metadata management, which would make digital identity documents less visible, foster trusted partnership, and therefore encourage trusted collaboration among networked computing ecosystems. Furthermore, an XRD-based implementation of digital identity document metadata is provided and explained.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bell, G., Gemmel, J.: A Digital Life, pp. 58–65. Scientific American Magazine (2007)

    Google Scholar 

  2. Galloway, A.R., Thacker, E.: The Exploit - A Theory of Networks. University of Minnesota Press (2008)

    Google Scholar 

  3. Palfrey, J., Gasser, U.: Born Digital: Understanding the first generation of digital natives. Basic Books (2008)

    Google Scholar 

  4. Gardiner, M.: The Business Value of Identity Federation(2007), http://whitepaper.techworld.com/authentication/4818/the-business-value-of-identity-federation

  5. International Telecommunication Union, Digital Life. ITU Internet Report (2006), http://www.itu.int/osg/spu/publications/digitalife/docs/digital-life-web.pdf

  6. Windley, P.J.: Digital Identity: Unmasking identity management architecture (IMA). O’Reilly, Sebastopol (2005)

    Google Scholar 

  7. Cukier, K.: A special report on managing information. The Economist (2010)

    Google Scholar 

  8. Facebook hack releases 100 million user details onto filesharing sites. Inforsecurity USA (2010), http://www.infosecurity-us.com/view/11343/facebook-hack-releases-100-million-user-details-onto-filesharing-sites/

  9. Fischetti, M.: Scoring Your Identity: New tactics root out the false use of personal data, pp. 27–28. Scientific American (2007)

    Google Scholar 

  10. Cochrane, P.: Forward of the Book. In: Birch, D.G.W. (ed.) Digital Identity Management: Perspectives on the Technological, Business and Social Implications, Gower Publishing Limited, England (2007)

    Google Scholar 

  11. Benantar, M.: Access Control Systems: Security, Identity Management and Trust Models. Springer, Heidelberg (2006)

    MATH  Google Scholar 

  12. Noonan, H.: Identity, Stanford Encyclopedia of Philosophy (2009)

    Google Scholar 

  13. Center for Democracy & Technology. Privacy Principles for Identity in the Digital Age [Draft for Comment - Version 1.4] (2007), http://www.cdt.org/files/pdfs/20071201_IDPrivacyPrinciples.pdf

  14. Organization for Economic Co-operation and Development (OECD), At Crossroads: Personhood and Digital Identity in the Information Society. The Working Paper series of the OECD Directorate for Science, Technology and Industry (2008), http://www.oecd.org/LongAbstract/0,3425,en_2649_34223_40204774_119684_1_1_1,00.html

  15. Williams, S.: This is Me Digital Identity and Reputation on the Internet, http://www.slideshare.net/shirleyearley/this-is-medigital-identity-and-reputation-on-the-internet

  16. Identity Gang Group - Working Group of Identity Common. Identity Gang Lexicon, http://wiki.idcommons.net/Lexicon

  17. Damiani, E., et al.: Managing Multiple and Dependable Identities. In: IEEE Internet Computing, pp. 29–37. IEEE Computer Society, Los Alamitos (2003)

    Google Scholar 

  18. Princeton University Wordnet - Lexical Database for English. Identity Definition, http://wordnetweb.princeton.edu/perl/webwn?o2=&o0=1&o7=&o5=&o1=1&o6=&o4=&o3=&s=identity&i=1&h=0000#c

  19. Fildes, J.: Taking Control of Your Digital ID (2006), http://news.bbc.co.uk/2/hi/technology/6102694.stm

  20. Cukier, K.: New Rules for Big Data: Regulators are having to rethink their brief. The Economist (2010), http://www.economist.com/specialreports/displaystory.cfm?story_id=15557487

  21. Mayer-Schönberger, V.: Delete: The virtue of forgetting in the digital age. Princeton University Press, Princeton (2009)

    Google Scholar 

  22. Brown, P.: Privacy in an Age of Terabytes and Terror. Scientific American Magazine, 46–47 (2008)

    Google Scholar 

  23. Garfinkel, S.L.: Information of the World, UNITE! Scientific American Magazine, 82–87 (2008)

    Google Scholar 

  24. Delicious, http://www.delicious.com

  25. Diigo, http://www.diigo.com

  26. Technorati, http://technorati.com

  27. OASIS eXtensible Resource Identifier (XRI) TC., Extensible Resource Descriptor (XRD) Version 1.0, OASIS Standard (2010), http://docs.oasis-open.org/xri/xrd/v1.0/xrd-1.0.html

  28. Hammer-Lahav, E.: XRD Document Structure (2009), http://hueniverse.com/2009/03/xrd-document-structure/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ben Ayed, G., Ghernaouti-Hélie, S. (2011). XRD Metadata to Make Digital Identity Less Visible and Foster Trusted Collaborations across Networked Computing Ecosystems. In: Fong, S. (eds) Networked Digital Technologies. NDT 2011. Communications in Computer and Information Science, vol 136. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22185-9_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22185-9_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22184-2

  • Online ISBN: 978-3-642-22185-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics