Abstract
We develop a simple model of the processes by which identity and anonymity are managed by complex systems. We explain New Zealand’s recently-proposed Identity Verification Service in terms of our model. We also indicate how our model might be used to guide the architecture of a next generation of trustworthy computing, and how it might be used to define a precise taxonomy of authentication.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
State Services Commission. Request for Expressions of Interest: All-of-government Authentication Programme - Identity Verification Service - Build Contract. New Zealand (October 2007)
Condon, R.: Jericho Forum puts meat on deperimeterisation (March 14, 2008), http://searchsecurity.techtarget.co.uk/
Edwards, J.: Privacy Impact Assessment of the All of Government Authentication Programme - Identity Verification Service. New Zealand (December 2005)
The Jericho Forum. Position paper: Collaboration oriented architectures (April 2008), http://www.opengroup.org/jericho
Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Requirements engineering for trust management: model, methodology, and reasoning. Int. J. Inf. Sec. 5(4), 257–274 (2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Thomborson, C. (2008). A Model for New Zealand’s Identity Verification Service. In: Lipp, P., Sadeghi, AR., Koch, KM. (eds) Trusted Computing - Challenges and Applications. Trust 2008. Lecture Notes in Computer Science, vol 4968. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-68979-9_7
Download citation
DOI: https://doi.org/10.1007/978-3-540-68979-9_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-68978-2
Online ISBN: 978-3-540-68979-9
eBook Packages: Computer ScienceComputer Science (R0)