Advertisement

XRD Metadata to Make Digital Identity Less Visible and Foster Trusted Collaborations across Networked Computing Ecosystems

  • Ghazi Ben Ayed
  • Solange Ghernaouti-Hélie
Part of the Communications in Computer and Information Science book series (CCIS, volume 136)

Abstract

Distributed computing ecosystems’ collaboration and mass integration between partners require extensive digital identities processing in order to better respond to services’ consumers. Such processing is increasingly implies loss of user’s control over identity, security risks and threads to privacy. Digital identity is represented by a set of linked and disparate documents distributed over computing ecosystems’ domains. We suggest an innovative approach based on metadata management, which would make digital identity documents less visible, foster trusted partnership, and therefore encourage trusted collaboration among networked computing ecosystems. Furthermore, an XRD-based implementation of digital identity document metadata is provided and explained.

Keywords

Less visible identity metadata documents management trusted partnership XRD identity-based collaboration 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bell, G., Gemmel, J.: A Digital Life, pp. 58–65. Scientific American Magazine (2007)Google Scholar
  2. 2.
    Galloway, A.R., Thacker, E.: The Exploit - A Theory of Networks. University of Minnesota Press (2008)Google Scholar
  3. 3.
    Palfrey, J., Gasser, U.: Born Digital: Understanding the first generation of digital natives. Basic Books (2008)Google Scholar
  4. 4.
    Gardiner, M.: The Business Value of Identity Federation(2007), http://whitepaper.techworld.com/authentication/4818/the-business-value-of-identity-federation
  5. 5.
    International Telecommunication Union, Digital Life. ITU Internet Report (2006), http://www.itu.int/osg/spu/publications/digitalife/docs/digital-life-web.pdf
  6. 6.
    Windley, P.J.: Digital Identity: Unmasking identity management architecture (IMA). O’Reilly, Sebastopol (2005)Google Scholar
  7. 7.
    Cukier, K.: A special report on managing information. The Economist (2010)Google Scholar
  8. 8.
    Facebook hack releases 100 million user details onto filesharing sites. Inforsecurity USA (2010), http://www.infosecurity-us.com/view/11343/facebook-hack-releases-100-million-user-details-onto-filesharing-sites/
  9. 9.
    Fischetti, M.: Scoring Your Identity: New tactics root out the false use of personal data, pp. 27–28. Scientific American (2007)Google Scholar
  10. 10.
    Cochrane, P.: Forward of the Book. In: Birch, D.G.W. (ed.) Digital Identity Management: Perspectives on the Technological, Business and Social Implications, Gower Publishing Limited, England (2007)Google Scholar
  11. 11.
    Benantar, M.: Access Control Systems: Security, Identity Management and Trust Models. Springer, Heidelberg (2006)zbMATHGoogle Scholar
  12. 12.
    Noonan, H.: Identity, Stanford Encyclopedia of Philosophy (2009)Google Scholar
  13. 13.
    Center for Democracy & Technology. Privacy Principles for Identity in the Digital Age [Draft for Comment - Version 1.4] (2007), http://www.cdt.org/files/pdfs/20071201_IDPrivacyPrinciples.pdf
  14. 14.
    Organization for Economic Co-operation and Development (OECD), At Crossroads: Personhood and Digital Identity in the Information Society. The Working Paper series of the OECD Directorate for Science, Technology and Industry (2008), http://www.oecd.org/LongAbstract/0,3425,en_2649_34223_40204774_119684_1_1_1,00.html
  15. 15.
    Williams, S.: This is Me Digital Identity and Reputation on the Internet, http://www.slideshare.net/shirleyearley/this-is-medigital-identity-and-reputation-on-the-internet
  16. 16.
    Identity Gang Group - Working Group of Identity Common. Identity Gang Lexicon, http://wiki.idcommons.net/Lexicon
  17. 17.
    Damiani, E., et al.: Managing Multiple and Dependable Identities. In: IEEE Internet Computing, pp. 29–37. IEEE Computer Society, Los Alamitos (2003)Google Scholar
  18. 18.
    Princeton University Wordnet - Lexical Database for English. Identity Definition, http://wordnetweb.princeton.edu/perl/webwn?o2=&o0=1&o7=&o5=&o1=1&o6=&o4=&o3=&s=identity&i=1&h=0000#c
  19. 19.
    Fildes, J.: Taking Control of Your Digital ID (2006), http://news.bbc.co.uk/2/hi/technology/6102694.stm
  20. 20.
    Cukier, K.: New Rules for Big Data: Regulators are having to rethink their brief. The Economist (2010), http://www.economist.com/specialreports/displaystory.cfm?story_id=15557487
  21. 21.
    Mayer-Schönberger, V.: Delete: The virtue of forgetting in the digital age. Princeton University Press, Princeton (2009)Google Scholar
  22. 22.
    Brown, P.: Privacy in an Age of Terabytes and Terror. Scientific American Magazine, 46–47 (2008)Google Scholar
  23. 23.
    Garfinkel, S.L.: Information of the World, UNITE! Scientific American Magazine, 82–87 (2008)Google Scholar
  24. 24.
  25. 25.
  26. 26.
  27. 27.
    OASIS eXtensible Resource Identifier (XRI) TC., Extensible Resource Descriptor (XRD) Version 1.0, OASIS Standard (2010), http://docs.oasis-open.org/xri/xrd/v1.0/xrd-1.0.html
  28. 28.
    Hammer-Lahav, E.: XRD Document Structure (2009), http://hueniverse.com/2009/03/xrd-document-structure/

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Ghazi Ben Ayed
    • 1
  • Solange Ghernaouti-Hélie
    • 1
  1. 1.Faculty of Business and EconomicsUniversity of LausanneLausanneSwitzerland

Personalised recommendations