GGG-Sources: Difference between revisions

From IDESG Wiki
Jump to navigation Jump to search
m (2 revisions imported: Initial Upload of old pages from IDESG Wiki)
 
(No difference)

Latest revision as of 04:00, 28 June 2018

Global Grid Glossary - Sources for References found in Glossary Sources of Definitions included in Global Glossary Grid (GGG)


Draft June 16, 2010


Prepared as a joint research project of the:


Identity Commons – Legal Working Group


and


American Bar Association – Business Law Section – Cyberspace Law Committee

__________________________________________


Please note that the GGG and this listing are intended for use by any interested parties for research and reference purposes relating to the analysis and development of technological tools and legal rules for public, private, governmental and other information systems. The material is not intended to be comprehensive or authoritative. Some materials are presented in summarized, edited or abbreviated forms. Original materials should be accessed for authoritative reference.


Please also note that many of the glossaries were originally presented in the context of a larger work. We have extracted the definitions for purposes of comparison here with other similar definitions, but have not made any attempt to carry forward their original context into this initial accumulation effort. Accordingly, some of the definitions may have been intended for a narrower use than might be suggested by their inclusion in this accumulation. Whatever their original intended use, it is believed that the definitions themselves (even stripped of their original context) can be helpful in evaluating other similar definitions.


Links to the individual glossary sources are provided for convenient access to referenced materials that are made publicly available on the internet by their authors. Persons interested in using such materials should review the relevant terms of conditions of use and contact the respective rights owners to make arrangements for the rights needed for the anticipated use.


Notes to User:


This chart is intended to provide easy access to original source materials that are included in the GGG.


The title of each of the various materials that included the glossary is provided below and in the GGG. The GGG also references the document number indicated below.


These are currently presented in random order. As the project moves forward, we will seek to apply technologies and system structures that will enhance the ability to restructure the data for presentation to users in a way that is most helpful to the various programs and initiatives in which it might be used.




DOCUMENT NAME

AUTHOR

DATE

WEB ADDRESS

1

Incommon Federation Participant Operational Practices


Last accessed 1/21/10

http://www.incommonfederation.org/docs/policies/incommonpop_20080208.html

Information distributed by operator of federated identity management system for institutions of higher education.

2

E-Authentication Federation Interim Legal Document Suite

e-Gov

10/14/05

http://www.japanpkiforum.jp/shiryou/e-auth_policy/EAI_Legal_Document_Suite_E.pdf k

Legal definitions related specifically to federated identity management agreement between U.S. government (General Services Administration) and Participants in federation.

3

Identipedia

IdCommons

Last accessed 1/19/10

http://wiki.idcommons.net/Identipedia

Wiki-encyclopedia of terms related to identity management.

4

Proposal for a Common Identity Framework: A User-Centric Identity Metasystem

Kim Cameron, Reinhard Posch, Kai Rannen-

berg

10/5/08

http://www.identityblog.com/wp-content/images/2009/06/usercentricidentitymetasystem.pdf

Basic identity management glossary with expanded explanation of “claims” in text of article.

5

Wikipedia:Digital Identity

Wikipedia

Last accessed 1/21/10

http://en.wikipedia.org/wiki/Digital_identity

Limited definition of “digital identity” and related terms.

6

Modinis: Common Terminological Framework for Interoperable Electronic Identity Management


11/23/05

https://www.cosic.esat.kuleuven.be/modinis-idm/twiki/bin/view.cgi/Main/GlossaryDoc?code=nld

Consultation paper prepared for the eGovernment Unit of the European Union Commission; attempts to create a common terminological framework.

7

Open Privacy.Org: Definitions

Open Privacy Initiative

Last accessed 1/21/10

http://www.openprivacy.org/opd.shtml

Technical definitions.

8

Random Thoughts on Digital Identity: Digital Identity Glossary

Blog: Random Thoughts on Digital Identity

8/23/07

http://blog.onghome.com/glossary.htm

Non-technical definitions.

9

The Identity Dictionary

Blog: Identity and Access Management (Allan Milgate)

8/21/06

http://identityaccessman.blogspot.com/

Basic definitions of 100 technical and non-technical terms related to “Identity and Access Management.”

10

National Security Telecommunications Advisory Committee (NSTAC) Report to the President on Identity Management Strategy

NSTAC

5/21/09

IDTF Report.pdf#14 http://www.ncs.gov/nstac/reports/2009/NSTAC%20IDTF%20Report.pdf#14

General glossary of identity management terms.

11

Identity Management Task Force Report 2008

National Science & Technology Council Subcommittee on Biometrics & Identity Management

2008

Reports/IdMReport Final.pdf http://www.ostp.gov/galleries/NSTC%20Reports/IdMReport%20Final.pdf

General glossary of identity management terms.

12

Electronic Authentication Partnership (EAP) Trust Framework

EAP

1/6/05

http://eap.projectliberty.org/docs/Trust_Framework_010605_final.pdf

General and technical glossary specific to the EAP Framework.

13

Federated Identity Management: Balancing Privacy Rights, Liability Risks, and the Duty to Authenticate

Thomas J. Smedinghoff

8/21/09

http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1471599

Limited general and legal glossary.

14

Kantara Identity Assurance Framework: Glossary

Editor: Britta Glade

10/14/09

www.kantarainitiative.org

General and technical glossary specific to Kantara Initiative.

15

Issues for Responsible User-Centric Identity

Center for Democracy & Technology

11/2009

Version 1

http://www.cdt.org/files/pdfs/Issues_for_Responsible_UCI.pdf

Defines “user-centric identity.”

16

Identity in the Age of Cloud Computing: The next-generation Internet’s impact on business, governance and social interaction

J.D. Lasica

2009

http://www.aspeninstitute.org/publications/identity-age-cloud-computing-next-generation-internets-impact-business-governance-socia

General definitions scattered throughout text.

17

Lexicon from IdCommons

IdCommons

Printed 01/19/10

http://wiki.idcommons.net/Lexicon

Wiki-glossary of general terms.

18

ABA Identity Management Services Agreement

American Bar Association, Section of Business Law, Federated Identity Management Legal Task Force

4/7/09

Not available online.

Sample agreement between “relying party” and “credential service provider.”

19

Oasis: Glossary for the OASIS Security Assertion Markup Language (SAML) V2.0

Oasis


http://docs.oasis-open.org/security/saml/v2.0/saml-glossary-2.0-os.pdf

Technical glossary with some general terms.

20

Liberty Alliance Privacy and Security Best Practices

Liberty Alliance Project

2003

http://www.projectliberty.org/liberty/resource_center/papers/liberty_alliance_privacy_and_security_best_practices/

Liberty-specific general glossary.

21

Liberty Glossary v.2.0

Liberty Alliance Project


http://www.projectliberty.org/resource_center/specifications/liberty_alliance_specifications_support_documents_and_utility_schema_files/liberty_glossary_v2_0/

Technical glossary.

22

Liberty Identity Assurance Framework

Liberty Alliance Project


http://www.projectliberty.org/liberty/content/download/4315/28869/file/liberty-identity-assurance-framework-v1.1.pdf

Technical and general glossary.

23

Public Key Infrastructure (PKI) Assessment Guidelines

American Bar Association, Information Security Committee

6/18/01

http://www.abanet.org/scitech/ec/isc/pagv30.pdf

Comprehensive glossary of general and technical terms.

24

ITU






Supplemental Index as of 6/7/10



DOCUMENT NAME

AUTHOR

DATE

WEB ADDRESS

25

RFID Application Privacy Impact Assessment Framework

European Commission

Nov. 30, XXXX

No website

26

ITU-T X.1252 Baseline Identity Management Terms and Definitions

International Telecommunication Union (ITU)

Apr. 2010

No website

27

Recommendation X.1252: Baseline Identity Management Terms and Definitions

International Telecommunication Union (ITU)

Apr. 2010

No website

28

Draft Recommendation X.1252: Baseline Identity Management Terms and Definitions

International Telecommunication Union (ITU)

Sept. 2009

No website

29

Draft Recommendation ITU-T X.priva, Criteria for assessing the level of protection for personally identifiable information in IdM

International Telecommunication Union (ITU)

Sept. 2009

No website

30

Draft Recommendation ITU-T X.1275, Guideline on Protection of personally identifiable information in the application of RFID technology

International Telecommunication Union (ITU)

Apr. 2010

No website

31

Generally Accepted Privacy Principles: a Global Privacy Network

American Institute for Certified Public Accountants


A Glossary.aspx http://www.aicpa.org/InterestAreas/InformationTechnology/Resources/Privacy/GenerallyAcceptedPrivacyPrinciples/GenerallyAcceptedPrivacyPrinciplesAppendixes/Pages/Appendix%20A%20Glossary.aspx

32

Glossary of Terms

Information Commissioner’s Office (UK)


http://www.ico.gov.uk/tools_and_resources/glossary.aspx

33

2006 Identity Fraud Survey Report

Javelin Strategy and Research


[Costs $___]


ADDED 6/9/10




34

Identity Management Terminology

Hitachi ID Systems, Inc. (formerly MTech, Inc.)

(website is © 2010 but no publ. date)

http://access-certifier.hitachi-id.com/docs/identity-management-terminology.html

35

Federal Information Processing Standards Publication – Personal Identity Verification (PIV) of Federal Employees and Contractors

National Institute of Standards and Technology (NIST)

May 2006

http://csrc.nist.gov/publications/fips/fips201-1/FIPS-201-1-chng1.pdf

36

Glossary of Key Information Security Terms

National Institute of Standards and Technology (NIST)

May 2010

http://csrc.nist.gov/publications/drafts/nistir-7298/draft-nistir-7298-rev1_glossary-key-security-terms.pdf