- From: Timothy Holborn <timothy.holborn@gmail.com>
- Date: Mon, 15 Feb 2016 16:25:58 +0000
- To: W3C Credentials Community Group <public-credentials@w3.org>
- Message-ID: <CAM1Sok09d3L6ncHEyzcoEZ2YDsKit-jaeuKt3TwLRwo99DZkDg@mail.gmail.com>
I found this[1] document. Whilst the techniques appear miss the opportunities brought about by Linked-data / Graph Databases / decentralised infrastructure; it does have a bunch of terminology. It also demonstrates the lack of terms for decentralised solutions, as existing technology is based on RDBMS business models, IMHO. This is exemplified by the use 'citizen cards' and similar root-identifier methodologies. [1] http://www.oecd.org/sti/ieconomy/49338380.pdf some extracts are per below. It might be a useful document to find solutions for terminology. _____________________________________ This guidance focuses on natural persons (“individuals”) interacting with the information systems of public and private organisations (“service providers” 3 ) through a digital network such as the Internet. _____________________________________ 1. In order to be known by the system, the individual must first register with it and the conditions related to his/her identity or identity attributes must be checked so he/she can be provided with a set of credentials; this is the so-called registration or enrolment process. 2. Appropriate permissions and privileges to access the organisation’s resources must be assigned to the individual, a process often called authorization. 3. To access resources, the individual makes an identity claim that can be verified: he/she logs into the system with the credentials provided during the registration process. This authentication process 7 establishes confidence in the user’s identity. 4. The result of the authentication process is used in a process called access control, whereby the system checks that the individual has the appropriate authorisation to access the resource. 5. When the individual is not associated anymore with the system, a revocation process must take place whereby his/her credentials are rescinded. _____________________________________ It is also essential to the security of the individual who accesses these resources, particularly when they belong or relate to him/her (e.g. money in a bank, or personal data such as a medical record).
Received on Monday, 15 February 2016 16:26:35 UTC