Remove 2005 Remove Architecture Remove Authentication
article thumbnail

In Memory of Kim Cameron

Phil Windley

We held the first IIW in October 2005. Kim not only saw the need for a set of laws to govern online identity system architecture, but also foresaw the need for an identity metasystem on the internet. I had met Kim and talked to him at several identity conferences back in the early 2000's.

Microsoft 133
article thumbnail

The Self-Sovereign Internet

Phil Windley

Alice) who, by virtue of knowing the authentication factors (e.g. In an autonomic identity architecture, the controller, Alice, generates a public-private key pair, derives a globally unique identifier, and shares the identifier and the currently associated public key with others to create relationships. claim it by logging in).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Generative Self-Sovereign Internet

Phil Windley

In 2005, Jonathan Zitrain wrote a compelling and prescient tribute to the generative capacity of the Internet and its tens of millions of attached PCs. Figure 2: Binding of controller, authentication factors, and identifiers in identity systems. From Key Event Receipt Infrastructure (KERI) Design Referenced 2020-12-21T11:08:57-0700.

Internet 135
article thumbnail

Geek of the Week: Tech vet Dick Hardt searches for a better way to verify your ?internet identity?

GeekWire

Although large providers such as Google, Facebook, Amazon, Apple, and Microsoft have sophisticated authentication systems that provide a simpler, safer method for users and application or site developers, there are concerns about privacy implications or limited choice. back in 2005.

Internet 111
article thumbnail

The Hacker Mind Podcast: Digital Forensics

ForAllSecure

It was for UNIX systems and it was created by Dan Farmer and Wheat-say Vene-ma, who then co-authored a book in 2005 called Forensic Discovery. To be good at digital forensics, to be a digital Sherlock Holmes, you need to understand systems architecture. Also multi factor authentication, that is a must.

article thumbnail

Apple WWDC 2020: iOS 14, ARM Macs, hardware rumors, and what else to expect

The Verge

There are rumors of improvements to iCloud Keychain , Apple’s built-in password management tool, which could be getting 1Password-like features to remind users to regularly change their passwords and support for two-factor authentication.

Hardware 136
article thumbnail

Life-Like Identity: Why the Internet Needs an Identity Metasystem

Phil Windley

In 2005, Kim Cameron, Microsoft’s Chief Identity Architect, published the Laws of Identity (PDF), a paper that laid out seven important principles for how digital identity should work. But they constrain architectural choices to ensure that the universal identity metasystem is not just usable, but also safe and secure.

Internet 102