A Model for New Zealand’s Identity Verification Service

  • Clark Thomborson
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4968)

Abstract

We develop a simple model of the processes by which identity and anonymity are managed by complex systems. We explain New Zealand’s recently-proposed Identity Verification Service in terms of our model. We also indicate how our model might be used to guide the architecture of a next generation of trustworthy computing, and how it might be used to define a precise taxonomy of authentication.

Keywords

Identification authentication trust security modelling 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    State Services Commission. Request for Expressions of Interest: All-of-government Authentication Programme - Identity Verification Service - Build Contract. New Zealand (October 2007)Google Scholar
  2. 2.
    Condon, R.: Jericho Forum puts meat on deperimeterisation (March 14, 2008), http://searchsecurity.techtarget.co.uk/
  3. 3.
    Edwards, J.: Privacy Impact Assessment of the All of Government Authentication Programme - Identity Verification Service. New Zealand (December 2005)Google Scholar
  4. 4.
    The Jericho Forum. Position paper: Collaboration oriented architectures (April 2008), http://www.opengroup.org/jericho
  5. 5.
    Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Requirements engineering for trust management: model, methodology, and reasoning. Int. J. Inf. Sec. 5(4), 257–274 (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Clark Thomborson
    • 1
  1. 1.Department of Computer ScienceThe University of AucklandNew Zealand

Personalised recommendations