7. How does thiswork? (simplified) ICT Delta 2010 7 Identity Provider Client Relying Party 3. uses service 1. authenticates 2. pseudonym & attributes
8. How does thiswork? (simplified) ICT Delta 2010 8 Identity Provider Client Relying Party uses service Facilitates this process by 1 Partial release of attributes (& pseudonym) 2 Asks client for consent 3 Additional password authentication
25. The minimum information needed for the purpose at hand should be released, and only to those who need it. Details should be retained no longer than necesary.
26. It should NOT be possible to automatically link up everything we do in all aspects of how we use the Internet. A single identifier that stitches everything up would have many unintended consequences.
27. We need choice in terms of who provides our identity information in different contexts.
28. The system must be built so we can understand how it works, make rational decisions and protect ourselves.
29. Devices through which we employ identity should offer people the same kinds of identity controls - just as car makers offer similar controls so we can all drive safely.http://www.identityblog.com/ ICT Delta 2010
Editor's Notes
MRZ alvast goed uitleggen wegens BAC op de volgende slide.Misschien hier al iets zeggen over de handtekeningen per data groep en niet per attribuut.