10.07.2015 Views

Report - Guardian

Report - Guardian

Report - Guardian

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The LSE Identity Project <strong>Report</strong>: June 2005 273Note 1: Microsoft’s take on digital identityPrivacy and security experts are not alone in critiquing the use of enterprise identitymanagement architectures outside of enterprise-to-employee contexts. Big companiesare increasingly finding it problematic.One prominent example of this is Microsoft. Mid 2004, Microsoft publiclyacknowledged that its original Passport strategy for distributed digital identity forindividuals online has been a complete failure outside of the narrow context of access tospecific Microsoft services. Other service providers did not appreciate the loss of theirautonomy, and individuals were highly concerned about the privacy and identity theftrisks of Passport.Following this debacle, Microsoft completely revised its strategy for distributed identitymanagement, taking instead a user-centric approach. In a recent white paper, Microsoftdiscusses what it believes are fundamental requirements that must be met by anydistributed identity management infrastructure that involves individuals. Specifically,the white paper discusses seven “laws of identity” that “explain the successes andfailures of digital identity systems.” It states that:“… The system must be designed to put the user in control—of whatdigital identities are used, and what information is released. … Law ofMinimal Disclosure: The solution that discloses the least amount ofidentifying information and best limits its use is the most stable longtermsolution. … The concept of "least identifying information"should be taken as meaning not only the fewest number of claims, butthe information least likely to identify a given individual acrossmultiple contexts. … Law of Directed Identity: A universal identitysystem must support both "omni-directional" identifiers for use bypublic entities and "unidirectional" identifiers for use by privateentities, thus facilitating discovery while preventing unnecessaryrelease of correlation handles. … A unidirectional identity relationwith a different site would involve fabricating a completely unrelatedidentifier. Because of this, there is no correlation handle emitted thatcan be shared between sites to assemble profile activities andpreferences into super-dossiers. … Public key certificates have thesame problem when used to identify individuals in contexts whereprivacy is an issue. It may be more than coincidental that certificateshave so far been widely used when in conformance with this law (i.e.,in identifying public Web sites) and generally ignored when it comesto identifying private individuals. …” 681Note 2: A look at the French e-government initiativeIn 2003, the ministry in charge of e-government in France published a four-yearstrategic plan 682 (PSAE) for 2004-2007 for e-government services to citizens, the681 Available athttp://msdn.microsoft.com/webservices/understanding/advancedwebservices/default.aspx?pull=/library/enus/dnwebsrv/html/lawsofidentity.asp682 Available at http://www.adae.gouv.fr/IMG/pdf/Le_plan_strategique-GB.pdf.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!