Laws for Secure Credentialing. Gilles Lisimaque Steve Howard Dave Auman. The Laws of Identity. User Control and Consent Minimal Disclosure for a Constrained Use Justifiable Parties Directed Identity Pluralism of Operators and Technologies Human Integration
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Steve HowardDave Auman
Source: “The Laws of Identity”, Kim Cameron, Architect of Identity, Microsoft Corporation
identity of the
but may not grant explicit
Link at enrollment and vetting
Link at use