decentralized-id.github.io/_posts/history/2020-01-02-personal-data-2010-15.md
2020-11-10 03:37:29 -05:00

32 KiB
Raw Blame History

date title description excerpt layout permalink tags categories last_modified_at
2020-01-02 History (2010-2014) Personal Data: Emergence of a New Assets Class During the first half of the 2010's we saw the emergence of personal data, as an asset class, and the dawn of modern identity schemes. Your IDENTITY is at the root of your relationship with any service providing company, including the telecom companies. Honestly sir, the proper structure of the global network that emanates out of US agencies, laboratories, universities, offices, homes and increasingly pockets, is one based on universal ownership. Individuals must own the data attributes relating to their identities on the digital network. I am concerned that America has not figured out how to create administrative owners of the identity attributes that are implied by the governing structure of our nation. How can we structure the data processing relationships between producers-service providers-consumers when the structure of citizenship has not even been defined adequately enough to translate appropriately into our digital reality. single /history/2010-2014/
Jolocom
Trust Framework
Credentials Community Group
Bitcoin
IndieAuth
OAuth
IBM
FIDO
Danube Tech
WebAuthN
Respect Network
History
2020-01-04

Personal Data: The Emergence of a New Asset Class

WEForum - Personal Data: The Emergence of a New Asset Class

Danube

Markus Sabadello began work on Project Danube, on the creation of an XDI based personal data store, always under the control of its users, as early as 2010.

Danube Tech <<

FIDO

(left off around) September 2018-https://fidoalliance.org/overview/history/

Sovereign Source Authority

  • The Power of Self-Control

    Your IDENTITY is at the root of your relationship with any service providing company, including the telecom companies. Honestly sir, the proper structure of the global network that emanates out of US agencies, laboratories, universities, offices, homes and increasingly pockets, is one based on universal ownership. Individuals must own the data attributes relating to their identities on the digital network. I am concerned that America has not figured out how to create administrative owners of the identity attributes that are implied by the governing structure of our nation. How can we structure the data processing relationships between producers-service providers-consumers when the structure of citizenship has not even been defined adequately enough to translate appropriately into our digital reality.

  • What is "Sovereign Source Authority"? - Devon Lofretto

    What is an Individual Human Being prior to "identity registration" in Society? What is the data administration framework of default participation in Society today?

    Society is an Agreement. It is made by and between Individuals. Within any Society, Individuals have an established Right to an "identity", and to all of the benefits and responsibilities of some form of "Nationally Sovereign Structure" of governance and administration. Sovereign Source Authority (SSA) refers to the actual default design parameter of Human identity, prior to the "registration" process used to inaugurate participation in Society.

  • 1Man/ManyMachines (@NZN)

    #indie Creator: Self-Sovereign $ID entities.. structure yields results. #OwnRoot #SovereignSourceAuthority $OYO Standing up civil Society, personally.

  • Open Mustard Seed - vimeo
  • ID3 - idcubed.org - Open Mustard Seed (OMS) Framework - web.archive.org - idcubed.org

    ID3 is a Boston, Massachusetts, research and educational nonprofit whose mission is to develop a new social ecosystem of trusted, self-healing digital institutions.

  • Self-sovereign vs. administrative identity

    You know who you are. So does the IRS, the DMV, and every website and service online where you have a login and a password for. But none of those entities really knows you. What they know is what t…

  • Personal = Sovereign

    We are all different. We look different, we sound different, we think and act different. Even soldiers marching lock-step in uniform are all different. Emperor Qui Shi Huang recognized this fact by…

  • Sovereign Source Identity in a University Environment #dooo

Life-management Platforms

  • Life Management Platforms: Control and Privacy for Personal Data by Martin Kuppinger - March 2012

    Turning the Internet upside down and making privacy a fundamental layer of any networked interaction in the post Google & Facebook era. How the individuals will gain control. How social networks will have to adapt their business models. How privacy will return.

  • Life Management Platforms

    KuppingerCole, an international, independent Analyst organization headquartered in Europe, specializes in offering technology research, neutral advice and events in Information Security, IAM, GRC as well as all areas concerning the Digital Transformation

ABC4Trust \ IBM Zurich

  • abc4trust.eu

    ABC4Trust is an EU-funded research and development project advancing the federation and interchangeability of technologies supporting trustworthy and at the same time privacy-preserving Attribute-based Credentials (Privacy-ABCs). In order to learn more about the project and Privacy-ABC technologies, click on the 'About ABC4Trust' tab on the left-hand side.

  • Concepts and Features of Privacy-Preserving Attribute-Based Credentials

    privacy-preserving attribute-based credentials engine

  • IBM Identity Mixer

    IBM Identity Mixer is a cryptographic protocol suite for privacy-preserving authentication and transfer of certified attributes.

  • IBM Research - Zurich, Identity Mixer
  • Concepts and Languages for Privacy-Preserving Attribute-Based Authentication - Jan Camenisch, Maria Dubovitskaya, Anja Lehmann, Gregory Neven, Christian Paquin, and Franz-Stefan Preiss - IBM Research Zurich \ ABC4Trust - 2013

    Abstract. Existing cryptographic realizations of privacy-friendly authentication mechanisms such as anonymous credentials, minimal disclosure tokens, selfblindable credentials, and group signatures vary largely in the features they offer and in how these features are realized. Some features such as revocation or de-anonymization even require the combination of several cryptographic protocols. These differences and the complexity of the cryptographic protocols hinder the deployment of these mechanisms for practical applications and also make it almost impossible to switch the underlying cryptographic algorithms once the application has been designed. In this paper, we aim to overcome this issue and simplify both the design and deployment of privacy-friendly authentication mechanisms. We define and unify the concepts and features of privacy-preserving attribute-based credentials (Privacy-ABCs) and provide a language framework in XML schema. Our language framework enables application developers to use Privacy-ABCs with all their features without having to consider the specifics of the underlying cryptographic algorithms—similar to as they do today for digital signatures, where they do not need to worry about the particulars of the RSA and DSA algorithms either.

OAuth2

  • OAuth #OAuth_2.0 -wikipedia.org

    OAuth 2.0 is not backwards compatible with OAuth 1.0. OAuth 2.0 provides specific authorization flows for web applications, desktop applications, mobile phones, and smart devices. The specification and associated RFCs are developed by the IETF OAuth WG;[7] the main framework was published in October 2012.

    Facebook's Graph API only supports OAuth 2.0.[8] Google supports OAuth 2.0 as the recommended authorization mechanism for all of its APIs.[9] Microsoft[10] also supports OAuth 2.0 for various APIs and its Azure Active Directory service, which is used to secure many Microsoft and third party APIs.

    The OAuth 2.0 Framework[11] and Bearer Token Usage[12] were published in October 2012.

  • OpenID Connect - wikipedia

    OpenID Connect (OIDC) is an authentication layer on top of OAuth 2.0, an authorization framework. The standard is controlled by the OpenID Foundation.

IndieAuth \ IndieWeb

  • IndieAuth - wikipedia

    IndieAuth is a standard decentralized authentication protocol that uses OAuth 2.0 and enables services to verify the identity of a user represented by a URL as well as to obtain an access token that can be used to access resources under the control of the user.. IndieAuth is ...

  • indieweb.org - timeline #2010

National Strategy for Trusted Identities in Cyberspace (NSTIC)

  • NATIONAL STRATEGY FORT RUSTED IDENTITIES IN CYBERSPACE (2011)
    • The Identity Ecosystem Framework is the overarching set of interoperability standards, risk models, privacy and liability policies, requirements, and accountability mechanisms that struc-ture the Identity Ecosystem
    • A steering group will administer the process for policy and standards development for the Identity Ecosystem Framework in accordance with the Guiding Principles in this Strategy The steering group will also ensure that accreditation authorities validate participants adherence to the requirements of the Identity Ecosystem Framework
    • A trust framework is developed by a community whose members have similar goals and perspectives It defines the rights and responsibilities of that communitys participants in the Identity Ecosystem; specifies the policies and standards specific to the community; and defines the community-specific processes and procedures that provide assurance A trust framework considers the level of risk associated with the transaction types of its participants; for example, for regulated industries, it could incorporate the requirements particular to that industryDifferent trust frameworks can exist within the Identity Ecosystem, and sets of participants can tailor trust frameworks to meet their particular needs In order to be a part of the Identity Ecosystem, all trust frameworks must still meet the baseline standards established by the Identity Ecosystem Framework
    • An accreditation authority assesses and validates identity providers, attribute providers, rely-ing parties, and identity media, ensuring that they all adhere to an agreed-upon trust framework. Accreditation authorities can issue trustmarks to the participants that they validate
    • A trustmark scheme is the combination of criteria that is measured to determine service provider compliance with the Identity Ecosystem Framework
  • NSTIC Implementation Hits an Important Milestone: The Identity Ecosystem Steering Group Exists!
  • Identity Ecosystem Steering Group - 8/2012

    Created to administer the development of policy, standards, and accreditation processes for the Identity Ecosystem Framework.

  • The Identity Ecosystem Steering Group (IDESG)

Respect Network

Around 2011, Respect Network began working to promote the idea of personal data clouds for the protection of personal information.

Respect Network is the world's first trusted personal data network that will let customers and companies connect over direct, personal channels that are always under the customer's control. Every member of the Respect Network agrees to the award-winning Respect Trust Framework so customers can be sure that the privacy and security of their personal data will always be respected.

The foundation of the Respect Network is the Respect Trust Framework, which was listed with the Open Identity Exchange in May 2011 and honored with the Privacy Award at the 2011 European Identity Conference. This is the umbrella legal contract to which every member (person or business) of the Respect Network agrees when they join the network

Windhover Principles

Namecoin

W3C Credentials Community Group

8/14 The Credentials Community Group[ϟ] forms, hosted by World Wide Web Consortium(W3C)

Pan Canadian Trust

  • Pan-Canadian Trust Framework ™ Work Program
  • TBS Identity Policy Workshop by Treasury Board of Canada Secretariat

    Treasury Board Identity Management Policy and Pan-Canadian Trust Framework

    Identity Management Policy Workshop

    Including the History of the Pan-Canadian Trust Framework

  • TBS Identity Policy Workshop

    Issued under Policy on Government Security (PGS)

    • 2009: Directive on Identity Management (applies to employees, external clients, organizations, and devices)
    • 2011: Federating Identity Management in the GC
    • 2012: Guideline on Defining Authentication Requirements
    • 2013: Standard on Identity and Credential Assurance
    • 2015: Guideline on Identity Assurance
    • 2016: CSE User Authentication Guidance for IT Systems
  • TBS Identity Policy Workshop : Treasury Board of Canada Secretariat

    Treasury Board Identity Management Policy and Pan-Canadian Trust FrameworkIdentity Management Policy WorkshopIncluding the History of the Pan-Canadian Trust...

Jolocom '02 \ '14

  • Jolocom: Who owns and controls your data?

    I always believed that I should be in control of my own data and share it accordingly. Therefore in 2002 I started Jolocom in San Francisco. But back then the resistance to open networks and communication was very strong, and the technological barrier to enter the market quite high. In the meantime at first social media and later blockchain changed the rules of the game. This is what lead us to start with Jolocom 3 years ago and ever since we won various grants, build a great team and a functional prototype.

{% include post_pagination.html %}