Home

Results 1 - 10 of 128,549 for identical. Search took 5.716 seconds.  
Sort by date/Sort by relevance
Anette Offenberger “Origin” Use Control “End”Origin   identity Use  Identity  Control  Identity  End   Identity Registration Documents Processes Instruments Sixth Symposium and Exhibition on ICAO MRTDs, Biometrics and Security Standards, 1 to 4 November 2010, Montréal  9 Identity InfrastructureIdentity Infrastructure “Origin” Use Control “End” Integrity of the MRTD issuance process: Mr Gary McDonald Origin   identity Use  Identity  Control  Identity  End   Identity Registration Documents Processes Instruments Sixth Symposium and Exhibition on ICAO MRTDs, Biometrics and Security Standards, 1 to 4 November 2010, Montréal  10 Identity InfrastructureIdentity Infrastructure “Origin” Use Control “End” Civil registries: Mr.  (...) Barry Kefauver Origin   identity Use  Identity  Control  Identity  End   Identity Registration Documents Processes Instruments Sixth Symposium and Exhibition on ICAO MRTDs, Biometrics and Security Standards, 1 to 4 November 2010, Montréal  12 Identity InfrastructureIdentity Infrastructure “Origin” Use Control “End” Combating document fraud: Mr.  (...) Dwight MacManus Origin   identity Use  Identity  Control  Identity  End   Identity Registration Documents Processes Instruments Sixth Symposium and Exhibition on ICAO MRTDs, Biometrics and Security Standards, 1 to 4 November 2010, Montréal  14 Identity InfrastructureIdentity Infrastructure Travel documents assessment: Mr. 
Language:English
Score: 774603.2 - https://www.icao.int/Meetings/...2010/Documentation/Knopjes.pdf
Data Source: un
In this presentation, we explain an identity management framework for NGN, and introduce a concept "identity convergence" that builds bridges between isolated user identities on different platforms and filters identity information when crossing the bridges. (...) These new identities are feeding back into the world of social and business affairs, offering a mix of plural identities and challenging traditional notions of identity. (...) Speaker: Hal LOCKHART ,   OASIS Session: 5 - Standards Activities on Digital Identities Title of Presentation: Federated Identity Standards at OASIS A number of technical committees at OASIS have developed specifications relevant to Digital Identity in general and Identity Federation in particular.
Language:English
Score: 768724.37 - https://www.itu.int/ITU-T/worksem/ngn/200612/abstracts.html
Data Source: un
Isolated Identity When the extensibility is low or non-existent in a given application centric identity system, it is effectively isolated from all other applications. (...) Problems different regulations regarding accounting, auditing and privacy across the world proper backup and disaster recovery integration of users other identities, e.g. in private life etc. User Centric Identity User centric identity systems (such as e.g. (...) International Telecommunication Union Identity Domains Technologies Higgins - an extensible, platform-independent, identity protocol-independent, software framework to support existing and new applications that give users more convenience, privacy and control over their identity information.
Language:English
Score: 767916.5 - https://www.itu.int/dms_pub/it.../15/04/T15040000020001PDFE.pdf
Data Source: un
Identity Convergence for NGN ITU-T Workshop on “Digital Identity for NGN“ Geneva, 5 December 2006 International Telecommunication Union ITU-T Identity Convergence for Identity Convergence for NGN Platform and BusinessNGN Platform and Business Hidehito Gomi Identity Architect, NEC Corporation ITU-T Workshop on “Digital Identity for NGN“ Geneva, 5 December 2006 2 ITU-T Outline o Existing IdM Framework on the Internet o IdM Framework for NGN o Identity Fragmentation o IdM Requirements for NGN o Identity Convergence o Technologies for Identity Convergence • Group Signature • Context Obfuscation • Privacy Policy Negotiation o NGN Business based on IdM o Summary ITU-T Workshop on “Digital Identity for NGN“ Geneva, 5 December 2006 3 ITU-T Existing IdM Framework on the Internet o SAML models roles of entities and interactions between them PEP (Policy Enforcement Point) Registration/ AuthN Req. (...) Service/network access Partner Operators ISPEnterprise Publication of Certificates (AuthN, Attributes) Verification Issuance of Certificates Users Delegation Req. of Identity related services Identity Related Services Such as Charging/billing IdP (Identity Provider) Network services ITU-T Workshop on “Digital Identity for NGN“ Geneva, 5 December 2006 5 ITU-T Identity Fragmentation o So far, identity info of a user is distributed & duplicated among different platforms, therefore • There is need to have multiple sign-on procedures for a wide range of services. • It is difficult to make good use of user’s identity info (trail, presence, geo-location) across different platforms. • It is troublesome for users to provide, retrieve and update all privacy info managed at each platform separately. (...) Identity Convergence for NGN Platform and Business Outline Existing IdM Framework on the Internet IdM Framework for NGN Identity Fragmentation IdM Requirements for NGN Identity Convergence Technologies for Identity Convergence Group Signature Context Obfuscation Privacy Policy Negotiation NGN Business based on IdM Summary
Language:English
Score: 767171.83 - https://www.itu.int/dms_pub/it.../06/04/T06040020010001PDFE.pdf
Data Source: un
 Page 148 - The Digital Financial Services (DFS) Ecosystem           Basic HTML Version Table of Contents View Full Version Page 148 - The Digital Financial Services (DFS) Ecosystem P. 148 ITU-T Focus Group Digital Financial Services Ecosystem 3 2 4 1 National Identity Management Commission, 2015, MasterCard, n.d., Ibid, Business Day, 2015, Udunze, 2015, National 6 5 7 8 9 Identity Management Commission, 2015, MasterCard, n.d., National Identity Management Commission, 2007, 2013 conver- 10 12 11 13 sion rates, National Identity Management Commission, 2013, Ibid., Ibid., National Identity Management Commission, 15 16 2013, National Identity Management Commission, 2015, Business Day, 2015, National Identity Management Commission, 14 18 17 19 2015, National Identity Management Commission, n.d., National Identity Management Commission, 2015, MasterCard, 21 22 n.d., BBC, 2014, MasterCard, n.d., National Identity Management Commission, 2015, Mastercard, n.d., Azeez, 2015, 20 24 23 27 26 25 Business Day, 2015, National Identity Management Commission, n.d.; National Identity Management Commission, 2013, Okonji, 2014 31 29 30 28 National Identity Management Commission, 2013, Udunze, 2014, National Identity Management System, 2013, National 33 32 34 Identity Management Commission, 2013, National Identity Management Commission, 2015, MasterCard, n.d., National Identity Management Commission, 2015 37 36 35 Grossman & Tarazi, 2014, National Identity Management Commission, 2015, National Identity Management Commission, 38 39 2015, BBC, 2014, National Identity Management Commission, 2015. 120     143     144     145     146     147     148     149     150     151     152     153          
Language:English
Score: 766255.2 - https://www.itu.int/en/publica.../files/basic-html/page148.html
Data Source: un
Draft RESOLUTION GSC-16/04: (Plenary) Identity Management (Revised) Document Title: Draft RESOLUTION GSC-16/04: (Plenary) Identity Management (Revised) Source: Identity Management and Identifications Systems HIS Panel at GSC-16 Opening Plenary Contacts: Bilel Jamoussi (ITU) GSC Session: Closing Plenary Agenda Item: 3.4 RESOLUTION GSC-16/04: (Plenary) Identity Management (Revised) The 16th Global Standards Collaboration meeting (Halifax, 31 October – 3 November 2011) Recognizing: a) the importance of Identity Management (IDM) to practically all forms of social and economic activity, as well as the technical development and deployment of all information and communication technology (ICT) services for diverse entities (persons, organizations/providers, and objects), including: 1) authentication and credentials; 2) identifiers and their resolution or use for access; 3) attributes including directories, presence and availability; 4) derivative identity information including reputation; 5) discovery and interoperability of the above authoritative resources; 6) identity assurance; and 7) identity management privacy, security and governance; b) a common interest of network operators, service/application providers, government, and users in effective, trusted, interoperable frameworks for Identity Management, and Open Identity Trust Frameworks for online interactions; c) that Identity Management capabilities are essential to almost all areas of GSC cooperation, including RFIDs, sensors, wireless and near-field devices, on-board GSM, IPTV, NGN, cloud computing, healthcare, emergency communications, e-government, disaster relief, product proofing against misuse of resources, lawful interception, mitigating identity theft; d) the rapidly increasing implementation of nomadic and mobile network access by users, providers, and objects to a complex interconnected set of providers necessitate enhanced and new IdM capabilities; e) that effective protection of all kinds of national communications, transportation, electrical and other critical infrastructures are fundamentally dependent on effective Identity Management capabilities; f) that ITU-T has initiated study of Identity Management requirements, architectures, security frameworks and interoperability including use cases and gap analysis (including coordination with other SDOs); g) that ISO/IEC JTC1/SCs and ISO TCs have already produced international standards and are developing others standards which address and resolve issues associated with management of identities. h) that ITU-T’s JCA-IdM (Joint Coordination Activity) coordinates IdM activities within ITU-T and collaborates with other major IdM standards bodies to resolve issues associated with management of identities. i) that standards of GSC organizations can provide a coherent systematic framework for enhancing trusted open Identity Management interoperability that can minimize risks and the development of mechanisms to mitigate the risks, and Open Identity Trust Frameworks for online secure online interactions; j) that common frameworks can provide for trusted global discovery and interoperability of identity resources; and k) that continuing cooperation and collaboration among organizations addressing Identity Management issues can promote progress and contribute to building and maintaining a culture of trusted, interoperable IdM capabilities. Resolves: 1) to request the ITU, with the assistance of Participating Standards Organizations (PSOs), to develop a comprehensive inventory of national, regional and international initiatives and activities in the area of Identity Management; 2) to encourage the ITU to explore the possibility of global harmonized Identity Management standards, including the development of an internationally recognized definition of IdM based on the ITU-T consensus model, taking into account important work undertaken by other international organizations including ISO/IEC JTC 1/SC 27; l) to encourage PSOs and Observer Organizations of the GSC to evaluate and enhance existing and evolving new standards, Recommendations, and administrative practices relating to Identity Management that promote discovery and interoperability of identity resources, and Open Identity Trust Frameworks for secure online interactions; 3) to encourage PSOs and Observer Organizations of the GSC to participate in global, regional, and national Identity Management collaborative activities, and to adopt common standards and administrative practices that enhance global Identity Management interoperability. 4) to encourage PSOs and Observer Organizations of the GSC to participate in the ITU-T’s Joint Coordination Activity for Identity Management (JCA-IdM); and 5) to encourage wide use of ITU-T Recommendations (e.g. the ITU-T IdM Landscape document, baseline terminology (X.1252), baseline capabilities Recommendation (X.1250), etc.) 6) to encourage active participation of organizations with need for IdM, particularly governments and financial institutions. 7) To encourage use of existing standards of this nature in support of any new IdM work. ________________ Page 1 of 2
Language:English
Score: 764620.65 - https://www.itu.int/en/ITU-T/g...closingplenary/GSC16-CL-11.doc
Data Source: un
The nature of digital identities is explored in this report, as well as a core definition of their usage presented, based on three phases: • Identity proofing - the process of establishing the legal identity of an entity presenting him/herself for registration. (...) The paper then describes different types of digital identities, from the foundational identity, usually created as part of a national identity scheme, and is typically based on the formal establishment of identity through the examination of qualifying (breeder) documents such as birth records, marriage certificates, and social security documents. (...) In addition to architectures, a further complication is the class of digital identity used – either static or dynamic. A static digital identity is derived from the foundational identity and is one that is typically issued by a national identity scheme, or historically, by a bank.
Language:English
Score: 764620.65 - https://www.itu.int/en/publica...n/files/basic-html/page42.html
Data Source: un
RESOLUTION GSC-16/04: (Plenary) Identity Management (Revised) RESOLUTION GSC-16/04: (Plenary) Identity Management (Revised) The 16th Global Standards Collaboration meeting (Halifax, 31 October – 3 November 2011) Recognizing: a) the importance of Identity Management (IdM) to practically all forms of social and economic activity, as well as the technical development and deployment of all Information and Communication Technology (ICT) services for diverse entities (persons, organizations/providers, and objects), including: 1) authentication and credentials; 2) identifiers and their resolution or use for access; 3) attributes including directories, presence and availability; 4) derivative identity information including reputation; 5) discovery and interoperability of the above authoritative resources; 6) identity assurance; and 7) identity management privacy, security and governance; b) a common interest of network operators, service/application providers, government, and users in effective, trusted, interoperable frameworks for Identity Management, and Open Identity Trust Frameworks for online interactions; c) that Identity Management capabilities are essential to almost all areas of GSC cooperation, including RFIDs, sensors, wireless and near-field devices, on-board GSM, IPTV, NGN, cloud computing, healthcare, emergency communications, e-government, disaster relief, product proofing against misuse of resources, lawful interception, mitigating identity theft; d) the rapidly increasing implementation of nomadic and mobile network access by users, providers, and objects to a complex interconnected set of providers necessitate enhanced and new IdM capabilities; e) that effective protection of all kinds of national communications, transportation, electrical and other critical infrastructures are fundamentally dependent on effective Identity Management capabilities; f) that ITU-T has initiated study of Identity Management requirements, architectures, security frameworks and interoperability including use cases and gap analysis (including coordination with other SDOs); g) that ISO/IEC JTC 1/SCs and ISO TCs have already produced international standards and are developing others standards which address and resolve issues associated with management of identities; h) that ITU-T’s JCA-IdM (Joint Coordination Activity - IdM) coordinates IdM activities within ITU-T and collaborates with other major IdM standards bodies to resolve issues associated with management of identities; i) that standards of GSC organizations can provide a coherent systematic framework for enhancing trusted open Identity Management interoperability that can minimize risks and the development of mechanisms to mitigate the risks, and Open Identity Trust Frameworks for online secure online interactions; j) that common frameworks can provide for trusted global discovery and interoperability of identity resources; and k) that continuing cooperation and collaboration among organizations addressing Identity Management issues can promote progress and contribute to building and maintaining a culture of trusted, interoperable IdM capabilities. Resolves: 1) to request the ITU, with the assistance of Participating Standards Organizations (PSOs), to develop a comprehensive inventory of national, regional and international initiatives and activities in the area of Identity Management; 2) to encourage the ITU to explore the possibility of global harmonized Identity Management standards, including the development of an internationally recognized definition of IdM based on the ITU-T consensus model, taking into account important work undertaken by other international organizations including ISO/IEC JTC 1/SC 27; 3) to encourage PSOs and Observer Organizations of the GSC to evaluate and enhance existing and evolving new standards, Recommendations, and administrative practices relating to Identity Management that promote discovery and interoperability of identity resources, and Open Identity Trust Frameworks for secure online interactions; 4) to encourage PSOs and Observer Organizations of the GSC to participate in global, regional, and national Identity Management collaborative activities, and to adopt common standards and administrative practices that enhance global Identity Management interoperability; 5) to encourage PSOs and Observer Organizations of the GSC to participate in the ITU-T’s Joint Coordination Activity for Identity Management (JCA-IdM); 6) to encourage wide use of ITU-T Recommendations (e.g. the ITU-T IdM Landscape document, baseline terminology (X.1252), baseline capabilities Recommendation (X.1250), etc.); 7) to encourage active participation of organizations with need for IdM, particularly governments and financial institutions; and 8) to encourage use of existing standards of this nature in support of any new IdM work. ________________ Page 1 of 2
Language:English
Score: 763904.64 - https://www.itu.int/en/ITU-T/g...ns/Res_GSC-16_slash_04_IdM.doc
Data Source: un
RESOLUTION GSC-13/M: (Source) Title (Status) Document Title: Draft RESOLUTION GSC-17/04: (Plenary) Identity Management and Identification Systems (Reaffirmed) Source: Identity Management and Identification Systems HIS Panel at GSC-17 Opening Plenary Contacts: Mr. Bilel Jamoussi (ITU) GSC Session: Closing Plenary Agenda Item: 3.4 RESOLUTION GSC-17/04: (Plenary) Identity Management (Reaffirmed) The 17th Global Standards Collaboration meeting (Jeju, 13 – 16 May 2013) Recognizing: a) the importance of Identity Management (IdM) to practically all forms of social and economic activity, as well as the technical development and deployment of all Information and Communication Technology (ICT) services for diverse entities (persons, organizations/providers, and objects), including: 1) authentication and credentials; 2) identifiers and their resolution or use for access; 3) attributes including directories, presence and availability; 4) derivative identity information including reputation; 5) discovery and interoperability of the above authoritative resources; 6) identity assurance; and 7) identity management privacy, security and governance; b) a common interest of network operators, service/application providers, government, and users in effective, trusted, interoperable frameworks for Identity Management, and Open Identity Trust Frameworks for online interactions; c) that Identity Management capabilities are essential to almost all areas of GSC cooperation, including RFIDs, sensors, wireless and near-field devices, on-board GSM, IPTV, NGN, cloud computing, healthcare, emergency communications, e-government, disaster relief, product proofing against misuse of resources, lawful interception, mitigating identity theft; d) the rapidly increasing implementation of nomadic and mobile network access by users, providers, and objects to a complex interconnected set of providers necessitate enhanced and new IdM capabilities; e) that effective protection of all kinds of national communications, transportation, electrical and other critical infrastructures are fundamentally dependent on effective Identity Management capabilities; f) that ITU-T has initiated study of Identity Management requirements, architectures, security frameworks and interoperability including use cases and gap analysis (including coordination with other SDOs); g) that ISO/IEC JTC 1/SCs and ISO TCs have already produced international standards and are developing others standards which address and resolve issues associated with management of identities; h) that ITU-T’s JCA-IdM (Joint Coordination Activity - IdM) coordinates IdM activities within ITU-T and collaborates with other major IdM standards bodies to resolve issues associated with management of identities; i) that standards of GSC organizations can provide a coherent systematic framework for enhancing trusted open Identity Management interoperability that can minimize risks and the development of mechanisms to mitigate the risks, and Open Identity Trust Frameworks for online secure online interactions; j) that common frameworks can provide for trusted global discovery and interoperability of identity resources; and k) that continuing cooperation and collaboration among organizations addressing Identity Management issues can promote progress and contribute to building and maintaining a culture of trusted, interoperable IdM capabilities. Resolves: 1) to request the ITU, with the assistance of Participating Standards Organizations (PSOs), to develop a comprehensive inventory of national, regional and international initiatives and activities in the area of Identity Management; 2) to encourage the ITU to explore the possibility of global harmonized Identity Management standards, including the development of an internationally recognized definition of IdM based on the ITU-T consensus model, taking into account important work undertaken by other international organizations including ISO/IEC JTC 1/SC 27; 3) to encourage PSOs and Observer Organizations of the GSC to evaluate and enhance existing and evolving new standards, Recommendations, and administrative practices relating to Identity Management that promote discovery and interoperability of identity resources, and Open Identity Trust Frameworks for secure online interactions; 4) to encourage PSOs and Observer Organizations of the GSC to participate in global, regional, and national Identity Management collaborative activities, and to adopt common standards and administrative practices that enhance global Identity Management interoperability; 5) to encourage PSOs and Observer Organizations of the GSC to participate in the ITU-T’s Joint Coordination Activity for Identity Management (JCA-IdM); 6) to encourage wide use of ITU-T Recommendations (e.g. the ITU-T IdM Landscape document, baseline terminology (X.1252), baseline capabilities Recommendation (X.1250), etc.); 7) to encourage active participation of organizations with need for IdM, particularly governments and financial institutions; and to encourage use of existing standards of this nature in support of any new IdM work Page 1 of 3
Language:English
Score: 763879.4 - https://www.itu.int/en/ITU-T/g...%20(Identity%20Management).doc
Data Source: un
Microsoft PowerPoint - 3 WS Speakers_presentation_Identity Jiwei Wei, Huawei.ppt ITU-T Workshop on “Digital Identity for NGN“ Geneva, 5 December 2006 International Telecommunication Union ITU-T Digital Identity Management Digital Identity Management TTowards owards UUltimate ltimate NNetwork etwork SSecurityecurity Jiwei Wei Security Architect, Huawei Technologies Co., Ltd. (...) Entity Identity needs to be effectively managed. ITU-T Workshop on “Digital Identity for NGN“ Geneva, 5 December 2006 6 ITU-T Requirement for NGN Identity Management o Internet access • E.g. (...) Federation ID ITU-T Workshop on “Digital Identity for NGN“ Geneva, 5 December 2006 18 ITU-T Thanks for Your Attention!
Language:English
Score: 763626.27 - https://www.itu.int/dms_pub/it.../06/04/T06040020030001PDFE.pdf
Data Source: un