Remove tag identity-assurance
article thumbnail

A New Job at AWS

Phil Windley

The job is in AWS Identity, and involves automated reasoning (formal methods). AWS re:Inforce 2022 - High assurance with provable security (click to play). Tags: identity aws security formal+methods automated+reasoning. I've been dark for a few weeks. Things have been busy. researchers. I'm excited to be working on it.

article thumbnail

Acceptance Networks for Self-Sovereign Identity

Phil Windley

That scenario is similar to the state of digital identity today. We have identity providers (IdPs) like Google and Apple who control a closed ecosystem of relying parties (with a lot of overlap). Fixing this requires the equivalent of an acceptance network for digital identity. Acceptance networks implement metasystems.

Network 89
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Data-Aware Security: How to Take a 360 View of Cloud Security

CIO Business Intelligence

But that doesn’t mean total security is assured. In the case of cloud infrastructure, users are responsible for application security, identity and access management, client and endpoint protection, data classification and user behavior. Much has changed since then. All cloud services operate under a shared responsibility model.

article thumbnail

Building Identity Systems on the Sovrin Network

Phil Windley

Summary: An identity metasystem like the Sovrin Network provides the foundation for creating tens of millions of interoperable identity systems for every conceivable context and use. This post discusses how these identity systems are built, illustrative use cases, and the potential marketplace for credentials.

System 87
article thumbnail

Fidelity, Provenance, and Trust

Phil Windley

The identity metasystem (orange box) provides assurances about the fidelity of the credential: the identifier of the issuer and that the credential was issued to the holder who is presenting it, hasn't been tampered with, and hasn't been revoked. Tags: sovrin identity trust fidelity metasystem.

Banking 56
article thumbnail

Zero Data

Phil Windley

My new book, Learning Digital Identity , talks about the concept. Anonymous Credential Proofs: VCs can be designed to be presented anonymously, allowing users to prove a claim about themselves without revealing their identity. Tags: zero+data identity verifiable+credentials zero+trust

Data 65
article thumbnail

Authentic Digital Relationships

Phil Windley

Summary: Self-sovereign identity, supported by a heterarchical identity metasystem, creates a firm foundation for rich digital relationships that allow people to digitally embodied so they can act online as autonomous agents. Administrative Identity Systems Create Anemic Relationships. Consequently, we built an identity system.