Skip to main content

Design Rationale behind the Identity Metasystem Architecture

  • Chapter
ISSE/SECURE 2007 Securing Electronic Business Processes

Abstract

Many of the problems facing the Internet today stem from the lack of a widely deployed, easily understood, secure identity solution. Microsoft’s “InfoCard” project and the Identity Metasystem vision underlying it are aimed at filling this gap using technology all can adopt and solutions all can endorse, putting users in control of their identity interactions on the Internet. The design decisions presented in this paper are intended to result in a widely accepted, broadly applicable, inclusive, comprehensible, privacyenhancing, securityenhancing identity solution for the Internet. We present them and the rationale behind them to facilitate review of these design decisions by the security, privacy, and policy communities, so that people will better understand Microsoft’s implementations, and to help guide others when building interoperating implementations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. AntiPhishing Working Group. Phishing Activity Trends Report, February 2005. http://antiphishing.org/ APWG_Phishing_Activity_Report_Feb05.pdf.

    Google Scholar 

  2. Kim Cameron. Kim Cameron’s Identity Weblog, May 2005. http://www.identityblog.com/.

    Google Scholar 

  3. Kim Cameron. The Laws of Identity. Microsoft Whitepaper, May 2005. http://msdn.microsoft. com/webservices/understanding/advancedwebservices/default.aspx?pull=/library/enus/dnwebsrv/ html/lawsofidentity.asp.

    Google Scholar 

  4. Federal Financial Institutions Examination Council. Authentication in an Internet Banking Environment, October2005. http://www.ffiec.gov/press/prl01205.htm And http://www.ffiec.gov/pdf/authentication_guidance.pdf

    Google Scholar 

  5. Gartner. Gartner Survey Shows Frequent Data Security Lapses and Increased Cyber Attacks Damage Consumer Trust in Online Commerce, June 2005. http://www.gartner.com/pressreleases/ asset_129754_11.html. 11

    Google Scholar 

  6. ETF. PublicKey Infrastructure (X.509) (pkix), December2005. http://www.ietf.org/html.charters/ pkixcharter.html.

    Google Scholar 

  7. Microsoft. Microsoft’s Vision for an Identity Metasystem. Microsoft Whitepaper, May 2005. http:// msdn.microsoft.com/webservices/unde rstanding/advancedwebservices/default.aspxVpulWlibrary/enus/dnwebsrv/html/identitymetasystem.asp.

    Google Scholar 

  8. Microsoft. Windows Vista Developer Center: InfoCard. http://msdn.microsoft.com/windowsvista/ building/infocard/.

    Google Scholar 

  9. Microsoft. WinFX Developer Center, January 2006. http://msdn.microsoft.com/winfx/.

    Google Scholar 

  10. Ping Identity. SourceID InfoCard STS Toolkit for Java, August 2005. http://www.sourceid.org/projects/ infocards/.

    Google Scholar 

  11. Web Services Metadata Exchange (WSMetadataExchange), September 2004. http:// specs.xmlsoap.org/ws/2004/09/mex/WSMetadataExchange.pdf.

    Google Scholar 

  12. Web Services Security: SOAP Message Security 1.0 (WSSecurity 2004), March2004. http:// docs.oasisopen.org/wss/2004/01/oasis-200401-wsssoapmessagesecurity-1.0.pdf.

    Google Scholar 

  13. Web Services Security Policy Language (WSSecurityPolicy), July 2005. http://specs. xml soap.org/ws/2005/OT/securitypolicy/wssecuritypolicy.pdf.

    Google Scholar 

  14. Web Services Trust Language (WS-Trust), February2005. http://specs.xmlsoap.org/ws/2005/02/ trust/WSTrust.pdf

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Friedr. Vieweg & Sohn Verlag | GWV Fachverlage GmbH, Wiesbaden

About this chapter

Cite this chapter

Cameron, K., Jones, M.B. (2007). Design Rationale behind the Identity Metasystem Architecture. In: ISSE/SECURE 2007 Securing Electronic Business Processes. Vieweg. https://doi.org/10.1007/978-3-8348-9418-2_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-8348-9418-2_13

  • Publisher Name: Vieweg

  • Print ISBN: 978-3-8348-0346-7

  • Online ISBN: 978-3-8348-9418-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics