www.archive-org-2013.com » ORG » P » PERSONALDATAECOSYSTEM

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".

    Archived pages: 1 . Archive date: 2013-11.

  • Title: Personal Data Ecosystem Consortium — Empowering People with Their Personal Data
    Descriptive info: .. Personal Data Ecosystem Consortium.. Empowering People with Their Personal Data.. Follow us on Twitter:.. @personaldata.. Home.. Join Us.. Startup Member Application.. Personal Membership Application.. Startup Directory.. Seminars.. Blog.. Get the PDE Newsletter.. What our Members Have to Say.. Our PDEC membership made us feel part of an industry.. By joining, we immediately felt as they we had a focal point for remaining current with industry trends, breaking news, and industry associations.. - Mark L.. Black, Origin Incorporated.. PDEC is THE trade organization for any company that wants to be seriously involved in the personal data or personal cloud industry.. No other organization has the unique DNA needed to organize companies who are all committed to putting the user first.. - Drummond Reed, Respect Network.. Kaliya brought a breath of fresh air to the identity conversations in New Zealand - forward thinking but not stratospheric, optimistic but not unrealistic - and above all, provoked thought and discussion long after she departed our shores.. Colin Wallis, Identity Rockstar of New Zealand.. Mesh Federation.. 22 October 2013.. by.. Steven Greenberg.. Leave a Comment.. A Mesh Federation provides a legal and policy umbrella so that institutions can interact with one another but does not specify technical methods.. Each member organization issues digital identities for its people and the federation agreement provides the legal framework for them to use one another’s resources.. The federation agreement might specify governance, policy, or roles, but the member institutions are free to implement using whatever technologies they like.. This is referred to as a mesh because participating services connect directly with one one another in order to authenticate identities.. For contrast, a federation network that provides a central identity clearing house is referred to a Technical federation (discussed below).. Examples:.. Mesh federations were pioneered by educational institutions.. Universities already had a culture of cooperation and realized that the interest of students and research goals of faculty were best served by the free flow of information.. NRENS (National Research and Education Networks) around the world include InCommon in the US, SurfnNET in the Netherlands, and JISC/Janet in the UK.. When to use:.. Large institutions wish to share resources and can agree on roles and governance, but do not need a central point for authenticating identity.. Advantages:.. Federation participants don’t need to negotiate custom agreements with every other member.. Disadvantages:.. Because of the need to gather broad adoption, mesh federations may be limited to the most common roles and might not cover complex use cases.. Ability to Scale:.. Because the mesh federation provides a standard contract, it scales to a large number of members.. Filed Under:.. Field Guide.. ,.. PDEC's Blog.. Federations.. A Federation provides a standard, pre-negotiated set of contracts that allow organizations to recognize identities issued by one another.. A federation agreement might specify user roles, governance, security and verification policies, or specific technical methods.. The federation is organized around a Contract Hub, which  ...   offer higher security than the service could practically provide on its own.. Large three-party model identity providers like Facebook, Google, and PayPal dedicate substantial resources to security.. Because participants can only interact if they have been authenticated by a single identity provider, that provider wields substantial power.. The identity provider effectively controls the requester s ability to use other company s products.. For instance, a requester who loses their account with the identity provider also loses all of the services where they used that identity.. If you use your Facebook to sign in to other products then you also lose those other products if your Facebook account is closed.. Conversely, a service provider that depends on a single third party identity provider leaves themselves open to the third party deciding to change its terms.. Difficult to get started because it is only interesting to service providers when it has consumers, but only interesting to consumers if it can offer interesting services.. Once they are established and functioning, however, a successful identity provider can build a very large network.. Bring Your Own Identity.. A special case of the three party model where the service provider specifies the technical methods that it will accept, but allows the requester to choose any identity service they like.. The service provider does not set details for identity verification or authentication and simply assumes that the requester has chosen one that s good enough for their purposes.. The service provider and requester agree to terms, the requester and the identity provider agree to terms, but the service provider does not make any agreement with the identity provider.. The most common Bring Your Own Identity technologies are SAML, OpenID, and email address verification.. The service provider does not want to bear the cost of managing the requester s identity, or wants to simplify account creation and sign-in.. The requester can use an existing identity rather than having to create a new one for this service.. If the requester chooses a good identity provider, the service gets the benefit of higher security with no additional cost.. The account is only as secure as the authenticating service.. The service provider depends on the user to select a trustworthy identity service.. Designing a user interface that allows the user to specify an identity provider has proved to be difficult.. Consumers don t generally have the experience to know a good identity provider from a bad one so, in practice, they depend upon seeing a familiar brand.. When OpenID was first introduced, supporting sites attempted to help by listing a large set of brands so that the user could choose a familiar one.. The resulting products ended up so festooned with logos that they were likened to NASCAR cars, and ended up being more confusing than helpful.. Next Page.. Subscribe.. Calendar.. Tweets from @personaldata/the-startup-circle.. Return to top of page.. Copyright 2013 - Personal Data Ecosystem.. All Rights Reserved..

    Original link path: /
    Open archive

  • Archived pages: 1