Abstract
Distributed computing ecosystems’ collaboration and mass integration between partners require extensive digital identities processing in order to better respond to services’ consumers. Such processing is increasingly implies loss of user’s control over identity, security risks and threads to privacy. Digital identity is represented by a set of linked and disparate documents distributed over computing ecosystems’ domains. We suggest an innovative approach based on metadata management, which would make digital identity documents less visible, foster trusted partnership, and therefore encourage trusted collaboration among networked computing ecosystems. Furthermore, an XRD-based implementation of digital identity document metadata is provided and explained.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bell, G., Gemmel, J.: A Digital Life, pp. 58–65. Scientific American Magazine (2007)
Galloway, A.R., Thacker, E.: The Exploit - A Theory of Networks. University of Minnesota Press (2008)
Palfrey, J., Gasser, U.: Born Digital: Understanding the first generation of digital natives. Basic Books (2008)
Gardiner, M.: The Business Value of Identity Federation(2007), http://whitepaper.techworld.com/authentication/4818/the-business-value-of-identity-federation
International Telecommunication Union, Digital Life. ITU Internet Report (2006), http://www.itu.int/osg/spu/publications/digitalife/docs/digital-life-web.pdf
Windley, P.J.: Digital Identity: Unmasking identity management architecture (IMA). O’Reilly, Sebastopol (2005)
Cukier, K.: A special report on managing information. The Economist (2010)
Facebook hack releases 100 million user details onto filesharing sites. Inforsecurity USA (2010), http://www.infosecurity-us.com/view/11343/facebook-hack-releases-100-million-user-details-onto-filesharing-sites/
Fischetti, M.: Scoring Your Identity: New tactics root out the false use of personal data, pp. 27–28. Scientific American (2007)
Cochrane, P.: Forward of the Book. In: Birch, D.G.W. (ed.) Digital Identity Management: Perspectives on the Technological, Business and Social Implications, Gower Publishing Limited, England (2007)
Benantar, M.: Access Control Systems: Security, Identity Management and Trust Models. Springer, Heidelberg (2006)
Noonan, H.: Identity, Stanford Encyclopedia of Philosophy (2009)
Center for Democracy & Technology. Privacy Principles for Identity in the Digital Age [Draft for Comment - Version 1.4] (2007), http://www.cdt.org/files/pdfs/20071201_IDPrivacyPrinciples.pdf
Organization for Economic Co-operation and Development (OECD), At Crossroads: Personhood and Digital Identity in the Information Society. The Working Paper series of the OECD Directorate for Science, Technology and Industry (2008), http://www.oecd.org/LongAbstract/0,3425,en_2649_34223_40204774_119684_1_1_1,00.html
Williams, S.: This is Me Digital Identity and Reputation on the Internet, http://www.slideshare.net/shirleyearley/this-is-medigital-identity-and-reputation-on-the-internet
Identity Gang Group - Working Group of Identity Common. Identity Gang Lexicon, http://wiki.idcommons.net/Lexicon
Damiani, E., et al.: Managing Multiple and Dependable Identities. In: IEEE Internet Computing, pp. 29–37. IEEE Computer Society, Los Alamitos (2003)
Princeton University Wordnet - Lexical Database for English. Identity Definition, http://wordnetweb.princeton.edu/perl/webwn?o2=&o0=1&o7=&o5=&o1=1&o6=&o4=&o3=&s=identity&i=1&h=0000#c
Fildes, J.: Taking Control of Your Digital ID (2006), http://news.bbc.co.uk/2/hi/technology/6102694.stm
Cukier, K.: New Rules for Big Data: Regulators are having to rethink their brief. The Economist (2010), http://www.economist.com/specialreports/displaystory.cfm?story_id=15557487
Mayer-Schönberger, V.: Delete: The virtue of forgetting in the digital age. Princeton University Press, Princeton (2009)
Brown, P.: Privacy in an Age of Terabytes and Terror. Scientific American Magazine, 46–47 (2008)
Garfinkel, S.L.: Information of the World, UNITE! Scientific American Magazine, 82–87 (2008)
Delicious, http://www.delicious.com
Diigo, http://www.diigo.com
Technorati, http://technorati.com
OASIS eXtensible Resource Identifier (XRI) TC., Extensible Resource Descriptor (XRD) Version 1.0, OASIS Standard (2010), http://docs.oasis-open.org/xri/xrd/v1.0/xrd-1.0.html
Hammer-Lahav, E.: XRD Document Structure (2009), http://hueniverse.com/2009/03/xrd-document-structure/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ben Ayed, G., Ghernaouti-Hélie, S. (2011). XRD Metadata to Make Digital Identity Less Visible and Foster Trusted Collaborations across Networked Computing Ecosystems. In: Fong, S. (eds) Networked Digital Technologies. NDT 2011. Communications in Computer and Information Science, vol 136. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22185-9_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-22185-9_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22184-2
Online ISBN: 978-3-642-22185-9
eBook Packages: Computer ScienceComputer Science (R0)