A Model for New Zealand’s Identity Verification Service
We develop a simple model of the processes by which identity and anonymity are managed by complex systems. We explain New Zealand’s recently-proposed Identity Verification Service in terms of our model. We also indicate how our model might be used to guide the architecture of a next generation of trustworthy computing, and how it might be used to define a precise taxonomy of authentication.
KeywordsIdentification authentication trust security modelling
Unable to display preview. Download preview PDF.
- 1.State Services Commission. Request for Expressions of Interest: All-of-government Authentication Programme - Identity Verification Service - Build Contract. New Zealand (October 2007)Google Scholar
- 2.Condon, R.: Jericho Forum puts meat on deperimeterisation (March 14, 2008), http://searchsecurity.techtarget.co.uk/
- 3.Edwards, J.: Privacy Impact Assessment of the All of Government Authentication Programme - Identity Verification Service. New Zealand (December 2005)Google Scholar
- 4.The Jericho Forum. Position paper: Collaboration oriented architectures (April 2008), http://www.opengroup.org/jericho