Abstract
Many of the problems facing the Internet today stem from the lack of a widely deployed, easily understood, secure identity solution. Microsoft’s “InfoCard” project and the Identity Metasystem vision underlying it are aimed at filling this gap using technology all can adopt and solutions all can endorse, putting users in control of their identity interactions on the Internet. The design decisions presented in this paper are intended to result in a widely accepted, broadly applicable, inclusive, comprehensible, privacyenhancing, securityenhancing identity solution for the Internet. We present them and the rationale behind them to facilitate review of these design decisions by the security, privacy, and policy communities, so that people will better understand Microsoft’s implementations, and to help guide others when building interoperating implementations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
AntiPhishing Working Group. Phishing Activity Trends Report, February 2005. http://antiphishing.org/ APWG_Phishing_Activity_Report_Feb05.pdf.
Kim Cameron. Kim Cameron’s Identity Weblog, May 2005. http://www.identityblog.com/.
Kim Cameron. The Laws of Identity. Microsoft Whitepaper, May 2005. http://msdn.microsoft. com/webservices/understanding/advancedwebservices/default.aspx?pull=/library/enus/dnwebsrv/ html/lawsofidentity.asp.
Federal Financial Institutions Examination Council. Authentication in an Internet Banking Environment, October2005. http://www.ffiec.gov/press/prl01205.htm And http://www.ffiec.gov/pdf/authentication_guidance.pdf
Gartner. Gartner Survey Shows Frequent Data Security Lapses and Increased Cyber Attacks Damage Consumer Trust in Online Commerce, June 2005. http://www.gartner.com/pressreleases/ asset_129754_11.html. 11
ETF. PublicKey Infrastructure (X.509) (pkix), December2005. http://www.ietf.org/html.charters/ pkixcharter.html.
Microsoft. Microsoft’s Vision for an Identity Metasystem. Microsoft Whitepaper, May 2005. http:// msdn.microsoft.com/webservices/unde rstanding/advancedwebservices/default.aspxVpulWlibrary/enus/dnwebsrv/html/identitymetasystem.asp.
Microsoft. Windows Vista Developer Center: InfoCard. http://msdn.microsoft.com/windowsvista/ building/infocard/.
Microsoft. WinFX Developer Center, January 2006. http://msdn.microsoft.com/winfx/.
Ping Identity. SourceID InfoCard STS Toolkit for Java, August 2005. http://www.sourceid.org/projects/ infocards/.
Web Services Metadata Exchange (WSMetadataExchange), September 2004. http:// specs.xmlsoap.org/ws/2004/09/mex/WSMetadataExchange.pdf.
Web Services Security: SOAP Message Security 1.0 (WSSecurity 2004), March2004. http:// docs.oasisopen.org/wss/2004/01/oasis-200401-wsssoapmessagesecurity-1.0.pdf.
Web Services Security Policy Language (WSSecurityPolicy), July 2005. http://specs. xml soap.org/ws/2005/OT/securitypolicy/wssecuritypolicy.pdf.
Web Services Trust Language (WS-Trust), February2005. http://specs.xmlsoap.org/ws/2005/02/ trust/WSTrust.pdf
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2007 Friedr. Vieweg & Sohn Verlag | GWV Fachverlage GmbH, Wiesbaden
About this chapter
Cite this chapter
Cameron, K., Jones, M.B. (2007). Design Rationale behind the Identity Metasystem Architecture. In: ISSE/SECURE 2007 Securing Electronic Business Processes. Vieweg. https://doi.org/10.1007/978-3-8348-9418-2_13
Download citation
DOI: https://doi.org/10.1007/978-3-8348-9418-2_13
Publisher Name: Vieweg
Print ISBN: 978-3-8348-0346-7
Online ISBN: 978-3-8348-9418-2
eBook Packages: Computer ScienceComputer Science (R0)