[LINK] RFC: Model of (Id)entity and (Id)entity Authentication
stephen at melbpc.org.au
stephen at melbpc.org.au
Wed Feb 25 21:21:41 AEDT 2009
> reviewable draft. Constructively negative feedback greatly appreciated.
Like your thinking Roger.. broad, insightful & respectful of humananity:
The term 'verification' is sometimes used as a synonym for
authentication. It is much less appropriate because 'verity' = 'truth'
and 'verify' = 'prove to be true', and hence 'verification' implies that
a very high level of confidence is necessary, and is attainable. The
term 'validation' is also sometimes used..
Assertion. There are many different categories of assertion that may be
important in particular contexts. They include an assertion of fact, an
assertion of data quality, an assertion relating to value, an attribute
assertion (i.e. that a particular (id)entity has a particular attribute),
a location assertion (i.e. that an entity is in a particular location),
and an agency assertion (i.e. that an (id)entity has the capacity to
represent, or act as an agent for, a principal).
A particular form of assertion that has been focussed upon by many
analysts to the virtual exclusion of all others can be usefully referred
to as an identity assertion. This is an assertion that an identifier is
being appropriately used, or that the identity in question is who or what
it purports or is inferred to be.
A further form of assertion is entity assertion. This is an assertion
that an entifier is being appropriately used, or that the entity in
question is who or what it purports or is inferred to be. Many analysts
fail to distinguish entity assertion from identity assertion, and thereby
create fundamental flaws in their designs.
(and)
It is common among analysts to discuss 'what the person does' and 'what
the person is' as though they were forms of identity authenticator rather
than entity authenticator. This is not only erroneous, but also harmful.
It was noted above that authentication of human identities is
challenging, expensive, onerous and even demeaning. Authentication of
human entities is substantially more so. It is undermined by a whole
litany of difficulties in achieving adequate measurement and comparison
quality. It suffers serious security vulnerabilities. And it is highly
personally intrusive and degrading.
--
> The paper is intended for the Identity Workshop at LSE on 5 June.
>
> Thanks!
>
>
> A Sufficiently Rich Model of (Id)entity, Authentication and
Authorisation
> http://www.rogerclarke.com/EC/IdModel.html
>
> During the last 20 years, the practice of identification and identity
> authentication has been highly unsatisfactory. One important reason
> for this has been that the theory underpinning the practice has been
> seriously deficient.
>
> A model is presented that is argued to be sufficiently comprehensive
> and rich to reflect the relevant complexities, and hence to guide
> organisations in devising architectures and business processes for
> such activities as user registration, 'sign-on' and 'identity
> management'. The sufficiency of the model is evaluated by means of
> brief analyses of its application to relevant categories of entity
> and identity.
>
>
> --
> Roger Clarke http://www.rogerclarke.com/
>
> Xamax Consultancy Pty Ltd 78 Sidaway St, Chapman ACT 2611 AUSTRALIA
> Tel: +61 2 6288 1472, and 6288 6916
> mailto:Roger.Clarke at xamax.com.au http://www.xamax.com.au/
>
> Visiting Professor in Info Science & Eng Australian National University
> Visiting Professor in the eCommerce Program University of Hong Kong
> Visiting Professor in the Cyberspace Law & Policy Centre Uni of NSW
> _______________________________________________
> Link mailing list
> Link at mailman.anu.edu.au
> http://mailman.anu.edu.au/mailman/listinfo/link
Message sent using MelbPC WebMail Server
More information about the Link
mailing list