GGG-Sources
Global Grid Glossary - Sources for References found in Glossary Sources of Definitions included in Global Glossary Grid (GGG)
Draft June 16, 2010
Prepared as a joint research project of the:
Identity Commons – Legal Working Group
and
American Bar Association – Business Law Section – Cyberspace Law Committee
__________________________________________
Please note that the GGG and this listing are intended for use by any interested parties for research and reference purposes relating to the analysis and development of technological tools and legal rules for public, private, governmental and other information systems. The material is not intended to be comprehensive or authoritative. Some materials are presented in summarized, edited or abbreviated forms. Original materials should be accessed for authoritative reference.
Please also note that many of the glossaries were originally presented in the context of a larger work. We have extracted the definitions for purposes of comparison here with other similar definitions, but have not made any attempt to carry forward their original context into this initial accumulation effort. Accordingly, some of the definitions may have been intended for a narrower use than might be suggested by their inclusion in this accumulation. Whatever their original intended use, it is believed that the definitions themselves (even stripped of their original context) can be helpful in evaluating other similar definitions.
Links to the individual glossary sources are provided for convenient access to referenced materials that are made publicly available on the internet by their authors. Persons interested in using such materials should review the relevant terms of conditions of use and contact the respective rights owners to make arrangements for the rights needed for the anticipated use.
Notes to User:
This chart is intended to provide easy access to original source materials that are included in the GGG.
The title of each of the various materials that included the glossary is provided below and in the GGG. The GGG also references the document number indicated below.
These are currently presented in random order. As the project moves forward, we will seek to apply technologies and system structures that will enhance the ability to restructure the data for presentation to users in a way that is most helpful to the various programs and initiatives in which it might be used.
|
DOCUMENT NAME |
AUTHOR |
DATE |
WEB ADDRESS |
1 |
Incommon Federation Participant Operational Practices |
|
Last accessed 1/21/10 |
http://www.incommonfederation.org/docs/policies/incommonpop_20080208.html Information distributed by operator of federated identity management system for institutions of higher education. |
2 |
E-Authentication Federation Interim Legal Document Suite |
e-Gov |
10/14/05 |
http://www.japanpkiforum.jp/shiryou/e-auth_policy/EAI_Legal_Document_Suite_E.pdf k Legal definitions related specifically to federated identity management agreement between U.S. government (General Services Administration) and Participants in federation. |
3 |
Identipedia |
IdCommons |
Last accessed 1/19/10 |
http://wiki.idcommons.net/Identipedia Wiki-encyclopedia of terms related to identity management. |
4 |
Proposal for a Common Identity Framework: A User-Centric Identity Metasystem |
Kim Cameron, Reinhard Posch, Kai Rannen- berg |
10/5/08 |
http://www.identityblog.com/wp-content/images/2009/06/usercentricidentitymetasystem.pdf Basic identity management glossary with expanded explanation of “claims” in text of article. |
5 |
Wikipedia:Digital Identity |
Wikipedia |
Last accessed 1/21/10 |
http://en.wikipedia.org/wiki/Digital_identity Limited definition of “digital identity” and related terms. |
6 |
Modinis: Common Terminological Framework for Interoperable Electronic Identity Management |
|
11/23/05 |
https://www.cosic.esat.kuleuven.be/modinis-idm/twiki/bin/view.cgi/Main/GlossaryDoc?code=nld Consultation paper prepared for the eGovernment Unit of the European Union Commission; attempts to create a common terminological framework. |
7 |
Open Privacy.Org: Definitions |
Open Privacy Initiative |
Last accessed 1/21/10 |
http://www.openprivacy.org/opd.shtml Technical definitions. |
8 |
Random Thoughts on Digital Identity: Digital Identity Glossary |
Blog: Random Thoughts on Digital Identity |
8/23/07 |
http://blog.onghome.com/glossary.htm Non-technical definitions. |
9 |
The Identity Dictionary |
Blog: Identity and Access Management (Allan Milgate) |
8/21/06 |
http://identityaccessman.blogspot.com/ Basic definitions of 100 technical and non-technical terms related to “Identity and Access Management.” |
10 |
National Security Telecommunications Advisory Committee (NSTAC) Report to the President on Identity Management Strategy |
NSTAC |
5/21/09 |
IDTF Report.pdf#14 http://www.ncs.gov/nstac/reports/2009/NSTAC%20IDTF%20Report.pdf#14 General glossary of identity management terms. |
11 |
Identity Management Task Force Report 2008 |
National Science & Technology Council Subcommittee on Biometrics & Identity Management |
2008 |
Reports/IdMReport Final.pdf http://www.ostp.gov/galleries/NSTC%20Reports/IdMReport%20Final.pdf General glossary of identity management terms. |
12 |
Electronic Authentication Partnership (EAP) Trust Framework |
EAP |
1/6/05 |
http://eap.projectliberty.org/docs/Trust_Framework_010605_final.pdf General and technical glossary specific to the EAP Framework. |
13 |
Federated Identity Management: Balancing Privacy Rights, Liability Risks, and the Duty to Authenticate |
Thomas J. Smedinghoff |
8/21/09 |
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1471599 Limited general and legal glossary. |
14 |
Kantara Identity Assurance Framework: Glossary |
Editor: Britta Glade |
10/14/09 |
General and technical glossary specific to Kantara Initiative. |
15 |
Issues for Responsible User-Centric Identity |
Center for Democracy & Technology |
11/2009 Version 1 |
http://www.cdt.org/files/pdfs/Issues_for_Responsible_UCI.pdf Defines “user-centric identity.” |
16 |
Identity in the Age of Cloud Computing: The next-generation Internet’s impact on business, governance and social interaction |
J.D. Lasica |
2009 |
General definitions scattered throughout text. |
17 |
Lexicon from IdCommons |
IdCommons |
Printed 01/19/10 |
http://wiki.idcommons.net/Lexicon Wiki-glossary of general terms. |
18 |
ABA Identity Management Services Agreement |
American Bar Association, Section of Business Law, Federated Identity Management Legal Task Force |
4/7/09 |
Not available online. Sample agreement between “relying party” and “credential service provider.” |
19 |
Oasis: Glossary for the OASIS Security Assertion Markup Language (SAML) V2.0 |
Oasis |
|
http://docs.oasis-open.org/security/saml/v2.0/saml-glossary-2.0-os.pdf Technical glossary with some general terms. |
20 |
Liberty Alliance Privacy and Security Best Practices |
Liberty Alliance Project |
2003 |
Liberty-specific general glossary. |
21 |
Liberty Glossary v.2.0 |
Liberty Alliance Project |
|
Technical glossary. |
22 |
Liberty Identity Assurance Framework |
Liberty Alliance Project |
|
Technical and general glossary. |
23 |
Public Key Infrastructure (PKI) Assessment Guidelines |
American Bar Association, Information Security Committee |
6/18/01 |
http://www.abanet.org/scitech/ec/isc/pagv30.pdf Comprehensive glossary of general and technical terms. |
24 |
ITU |
|
|
|
Supplemental Index as of 6/7/10
|
DOCUMENT NAME |
AUTHOR |
DATE |
WEB ADDRESS |
25 |
RFID Application Privacy Impact Assessment Framework |
European Commission |
Nov. 30, XXXX |
No website |
26 |
ITU-T X.1252 Baseline Identity Management Terms and Definitions |
International Telecommunication Union (ITU) |
Apr. 2010 |
No website |
27 |
Recommendation X.1252: Baseline Identity Management Terms and Definitions |
International Telecommunication Union (ITU) |
Apr. 2010 |
No website |
28 |
Draft Recommendation X.1252: Baseline Identity Management Terms and Definitions |
International Telecommunication Union (ITU) |
Sept. 2009 |
No website |
29 |
Draft Recommendation ITU-T X.priva, Criteria for assessing the level of protection for personally identifiable information in IdM |
International Telecommunication Union (ITU) |
Sept. 2009 |
No website |
30 |
Draft Recommendation ITU-T X.1275, Guideline on Protection of personally identifiable information in the application of RFID technology |
International Telecommunication Union (ITU) |
Apr. 2010 |
No website |
31 |
Generally Accepted Privacy Principles: a Global Privacy Network |
American Institute for Certified Public Accountants |
|
|
32 |
Glossary of Terms |
Information Commissioner’s Office (UK) |
|
|
33 |
2006 Identity Fraud Survey Report |
Javelin Strategy and Research |
|
[Costs $___] |
|
ADDED 6/9/10 |
|
|
|
34 |
Identity Management Terminology |
Hitachi ID Systems, Inc. (formerly MTech, Inc.) |
(website is © 2010 but no publ. date) |
http://access-certifier.hitachi-id.com/docs/identity-management-terminology.html |
35 |
Federal Information Processing Standards Publication – Personal Identity Verification (PIV) of Federal Employees and Contractors |
National Institute of Standards and Technology (NIST) |
May 2006 |
http://csrc.nist.gov/publications/fips/fips201-1/FIPS-201-1-chng1.pdf |
36 |
Glossary of Key Information Security Terms |
National Institute of Standards and Technology (NIST) |
May 2010 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|