Foreword |
|
xiii | |
Preface |
|
xvii | |
|
|
1 | (6) |
|
|
2 | (1) |
|
Identity Is Bigger Than You Think |
|
|
3 | (1) |
|
No Universal Identity Systems |
|
|
4 | (1) |
|
|
5 | (2) |
|
2 Defining Digital Identity |
|
|
7 | (12) |
|
The Language of Digital Identity |
|
|
8 | (3) |
|
Identity Scenarios in the Physical World |
|
|
11 | (1) |
|
Identity, Security, and Privacy |
|
|
11 | (1) |
|
Digital Identity Perspectives |
|
|
12 | (3) |
|
|
13 | (1) |
|
|
14 | (1) |
|
Reimagining Decentralized and Distributed |
|
|
15 | (3) |
|
|
18 | (1) |
|
3 The Problems of Digital Identity |
|
|
19 | (8) |
|
Tacit Knowledge and the Physical World |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
The (Lack of) Anonymity Problem |
|
|
23 | (1) |
|
The Interoperability Problem |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
25 | (2) |
|
4 The Laws of Digital Identity |
|
|
27 | (16) |
|
|
28 | (1) |
|
|
29 | (10) |
|
|
30 | (1) |
|
Minimal Disclosure for a Constrained Use |
|
|
31 | (1) |
|
|
32 | (2) |
|
|
34 | (1) |
|
Pluralism of Operators and Technologies |
|
|
35 | (1) |
|
|
36 | (2) |
|
Consistent Experience Across Contexts |
|
|
38 | (1) |
|
Fixing the Problems of Identity |
|
|
39 | (4) |
|
5 Relationships and Identity |
|
|
43 | (12) |
|
|
44 | (2) |
|
|
46 | (1) |
|
|
47 | (3) |
|
Anonymity and Pseudonymity |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
50 | (2) |
|
Transactional and Interactional Relationships |
|
|
52 | (2) |
|
Promoting Rich Relationships |
|
|
54 | (1) |
|
6 The Digital Relationship Lifecyde |
|
|
55 | (6) |
|
|
56 | (1) |
|
|
56 | (1) |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
59 | (1) |
|
|
60 | (1) |
|
7 Trust, Confidence, and Risk |
|
|
61 | (12) |
|
|
63 | (2) |
|
|
65 | (1) |
|
|
66 | (2) |
|
|
68 | (1) |
|
Coherence and Social Systems |
|
|
69 | (2) |
|
Trust, Confidence, and Coherence |
|
|
71 | (2) |
|
|
73 | (26) |
|
|
73 | (4) |
|
Communications Privacy and Confidentiality |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
76 | (1) |
|
|
77 | (1) |
|
Privacy, Authenticity, and Confidentiality |
|
|
78 | (2) |
|
|
80 | (2) |
|
|
82 | (6) |
|
Principle 1 Proactive Not Reactive; Preventive Not Remedial |
|
|
82 | (1) |
|
Principle 2 Privacy as the Default Setting |
|
|
83 | (1) |
|
Principle 3 Privacy Embedded into Design |
|
|
84 | (1) |
|
Principle 4 Full Functionality---Positive-Sum, Not Zero-Sum |
|
|
84 | (1) |
|
Principle 5 End-to-End Security---Full Lifecycle Protection |
|
|
85 | (1) |
|
Principle 6 Visibility and Transparency---Keep It Open |
|
|
85 | (3) |
|
Principle 7 Respect for User Privacy---Keep It User-Centric |
|
|
88 | (1) |
|
|
88 | (5) |
|
General Data Protection Regulation |
|
|
89 | (2) |
|
California Consumer Privacy Act |
|
|
91 | (1) |
|
|
92 | (1) |
|
The Time Value and Time Cost of Privacy |
|
|
93 | (2) |
|
Surveillance Capitalism and Web 2.0 |
|
|
95 | (1) |
|
Privacy and Laws of Identity |
|
|
96 | (3) |
|
9 Integrity, Nonrepudiation, and Confidentiality |
|
|
99 | (38) |
|
|
100 | (8) |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
103 | (2) |
|
Public-Key Cryptosystem Algorithms |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
106 | (2) |
|
Message Digests and Hashes |
|
|
108 | (2) |
|
|
110 | (1) |
|
|
111 | (12) |
|
|
117 | (1) |
|
Certificate Revocation Lists |
|
|
118 | (2) |
|
Public-Key Infrastructures |
|
|
120 | (3) |
|
|
123 | (5) |
|
|
125 | (1) |
|
|
126 | (2) |
|
|
128 | (7) |
|
|
128 | (1) |
|
Byzantine Failure and Sybil Attacks |
|
|
129 | (1) |
|
|
130 | (3) |
|
Other Ways of Countering Sybil Attacks |
|
|
133 | (1) |
|
|
133 | (1) |
|
Should You Use a Blockchain? |
|
|
134 | (1) |
|
|
135 | (2) |
|
10 Names, Identifiers, and Discovery |
|
|
137 | (24) |
|
Utah.gov: A Use Case in Naming and Directories |
|
|
137 | (2) |
|
|
139 | (6) |
|
|
140 | (2) |
|
|
142 | (3) |
|
|
145 | (1) |
|
|
145 | (8) |
|
|
146 | (3) |
|
|
149 | (1) |
|
|
150 | (3) |
|
Heterarchical Directories |
|
|
153 | (7) |
|
Personal Directories and Introductions |
|
|
154 | (1) |
|
|
155 | (2) |
|
Using Blockchains for Discovery |
|
|
157 | (3) |
|
|
160 | (1) |
|
11 Authentication and Relationship Integrity |
|
|
161 | (28) |
|
|
162 | (1) |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
163 | (4) |
|
Knowledge Factor: Something You Know |
|
|
164 | (1) |
|
Possession Factor: Something You Have |
|
|
165 | (1) |
|
Inherence Factor: Something You Are |
|
|
166 | (1) |
|
Behavior Factor: Something You Do |
|
|
166 | (1) |
|
Location Factor: Somewhere You Are |
|
|
166 | (1) |
|
Temporal Factor: Some Time You're In |
|
|
167 | (1) |
|
|
167 | (11) |
|
|
168 | (2) |
|
Identifier and Authentication Factors |
|
|
170 | (3) |
|
Challenge-Response Systems |
|
|
173 | (5) |
|
Token-Based Authentication |
|
|
178 | (1) |
|
Classifying Authentication Strength |
|
|
178 | (5) |
|
The Authentication Pyramid |
|
|
179 | (4) |
|
Authentication Assurance Levels |
|
|
183 | (1) |
|
|
183 | (2) |
|
Authentication System Properties |
|
|
185 | (3) |
|
|
186 | (1) |
|
Appropriate Level of Security |
|
|
186 | (1) |
|
|
186 | (1) |
|
|
187 | (1) |
|
Appropriate Level of Privacy |
|
|
187 | (1) |
|
|
187 | (1) |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
188 | (1) |
|
Authentication Preserves Relationship Integrity |
|
|
188 | (1) |
|
12 Access Control and Relationship Utility |
|
|
189 | (16) |
|
|
190 | (3) |
|
|
191 | (1) |
|
Principle of Least Privilege |
|
|
192 | (1) |
|
Accountability Scales Better Than Enforcement |
|
|
192 | (1) |
|
|
193 | (6) |
|
Mandatory and Discretionary Access Control |
|
|
193 | (1) |
|
User-Based Permission Systems |
|
|
194 | (2) |
|
|
196 | (1) |
|
Role-Based Access Control |
|
|
196 | (2) |
|
Attribute- and Policy-Based Access Control |
|
|
198 | (1) |
|
Abstract Authorization Architectures |
|
|
199 | (1) |
|
Representing and Managing Access Control Policies |
|
|
200 | (3) |
|
Handling Complex Policy Sets |
|
|
203 | (1) |
|
Digital Certificates and Access Control |
|
|
204 | (1) |
|
Maintaining Proper Boundaries |
|
|
204 | (1) |
|
13 Federated Identity---Leveraging Strong Relationships |
|
|
205 | (34) |
|
The Nature of Federated Identity |
|
|
207 | (1) |
|
|
208 | (1) |
|
Federation in the Credit Card Industry |
|
|
209 | (1) |
|
Three Federation Patterns |
|
|
210 | (6) |
|
Pattern 1 Ad Hoc Federation |
|
|
210 | (1) |
|
Pattern 2 Hub-and-Spoke Federation |
|
|
211 | (2) |
|
Pattern 3 Identity Federation Network |
|
|
213 | (3) |
|
Addressing the Problem of Trust |
|
|
216 | (1) |
|
Network Effects and Digital Identity Management |
|
|
217 | (1) |
|
Federation Methods and Standards |
|
|
218 | (18) |
|
|
218 | (4) |
|
|
222 | (2) |
|
|
224 | (2) |
|
|
226 | (8) |
|
|
234 | (2) |
|
|
236 | (1) |
|
Networked Federation Wins |
|
|
237 | (2) |
|
14 Cryptographic Identifiers |
|
|
239 | (22) |
|
The Problem with Email-Based Identifiers |
|
|
240 | (1) |
|
Decentralized Identifiers |
|
|
241 | (7) |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
243 | (1) |
|
|
244 | (2) |
|
Indirection and Key Rotation |
|
|
246 | (2) |
|
|
248 | (11) |
|
|
248 | (2) |
|
|
250 | (6) |
|
Key Event Receipt Infrastructure |
|
|
256 | (2) |
|
Other Autonomic Identifier Systems |
|
|
258 | (1) |
|
Cryptographic Identifiers and the Laws of Identity |
|
|
259 | (2) |
|
15 Verifiable Credentials |
|
|
261 | (28) |
|
The Nature of Credentials |
|
|
262 | (3) |
|
Roles in Credential Exchange |
|
|
263 | (1) |
|
Credential Exchange Transfers Trust |
|
|
264 | (1) |
|
|
265 | (2) |
|
|
267 | (4) |
|
|
268 | (1) |
|
|
269 | (1) |
|
|
269 | (2) |
|
Credential Presentation Types |
|
|
271 | (7) |
|
Full Credential Presentation |
|
|
271 | (4) |
|
Derived Credential Presentation |
|
|
275 | (3) |
|
Answering Trust Questions |
|
|
278 | (1) |
|
The Properties of Credential Exchange |
|
|
279 | (2) |
|
|
281 | (3) |
|
Alternatives to DIDs for VC Exchange |
|
|
284 | (2) |
|
A Marketplace for Credentials |
|
|
286 | (1) |
|
VCs Expand Identity Beyond Authn and Authz |
|
|
287 | (2) |
|
16 Digital Identity Architectures |
|
|
289 | (12) |
|
The Trust Basis for Identifiers |
|
|
290 | (1) |
|
|
291 | (6) |
|
Administrative Architecture |
|
|
292 | (1) |
|
|
293 | (2) |
|
|
295 | (2) |
|
Algorithmic and Autonomic Identity in Practice |
|
|
297 | (1) |
|
Comparing Identity Architectures |
|
|
298 | (1) |
|
|
299 | (1) |
|
|
300 | (1) |
|
17 Authentic Digital Relationships |
|
|
301 | (16) |
|
Administrative Identity Systems Create Anemic Relationships |
|
|
302 | (3) |
|
Alternatives to Transactional Relationships |
|
|
305 | (2) |
|
The Self-Sovereign Alternative |
|
|
307 | (3) |
|
Supporting Authentic Relationships |
|
|
310 | (4) |
|
Disintermediating Platforms |
|
|
310 | (2) |
|
Digitizing Auto Accidents |
|
|
312 | (2) |
|
Taking Our Rightful Place in the Digital Sphere |
|
|
314 | (3) |
|
18 Identity Wallets and Agents |
|
|
317 | (22) |
|
|
318 | (2) |
|
|
320 | (2) |
|
|
322 | (1) |
|
Properties of Wallets and Agents |
|
|
323 | (1) |
|
|
324 | (8) |
|
DID Authentication Pattern |
|
|
324 | (2) |
|
Single-Party Credential Authorization Pattern |
|
|
326 | (2) |
|
Multiparty Credential Authorization Pattern |
|
|
328 | (2) |
|
Revisiting the Generalized Authentic Data Transfer Pattern |
|
|
330 | (2) |
|
|
332 | (4) |
|
Step 1 Alice Revokes the Lost Agents Authorization |
|
|
333 | (1) |
|
Step 2 Alice Rotates Her Relationship Keys |
|
|
333 | (1) |
|
|
334 | (1) |
|
Protecting the Information in Alice's Wallet |
|
|
334 | (1) |
|
|
335 | (1) |
|
Web3, Agents, and Digital Embodiment |
|
|
336 | (3) |
|
|
339 | (22) |
|
|
339 | (4) |
|
Principles of Self-Sovereign Communication |
|
|
342 | (1) |
|
Reciprocal Negotiated Accountability |
|
|
342 | (1) |
|
|
343 | (2) |
|
|
345 | (1) |
|
|
346 | (4) |
|
Properties of DIDComm Messaging |
|
|
347 | (1) |
|
|
348 | (2) |
|
|
350 | (3) |
|
|
350 | (2) |
|
Protocols Beyond Credential Exchange |
|
|
352 | (1) |
|
Smart Agents and the Future of the Internet |
|
|
353 | (1) |
|
Operationalizing Digital Relationships |
|
|
354 | (4) |
|
|
356 | (1) |
|
Realizing the Smart Agent Vision |
|
|
357 | (1) |
|
|
358 | (3) |
|
20 Identity on the Internet of Things |
|
|
361 | (24) |
|
Access Control for Devices |
|
|
362 | (5) |
|
|
364 | (1) |
|
OAuth's Shortcomings for the IoT |
|
|
364 | (3) |
|
|
367 | (3) |
|
|
367 | (1) |
|
Online 2.0: The Silos Strike Back |
|
|
368 | (1) |
|
A Real, Open Internet of Things |
|
|
369 | (1) |
|
Alternatives to the CompuServe of Things |
|
|
370 | (3) |
|
The Self-Sovereign Internet of Things |
|
|
373 | (5) |
|
DID Relationships for IoT |
|
|
374 | (1) |
|
Use Case 1 Updating Firmware |
|
|
374 | (1) |
|
Use Case 2 Proving Ownership |
|
|
375 | (1) |
|
Use Case 3 Real Customer Service |
|
|
376 | (2) |
|
Relationships in the SSIoT |
|
|
378 | (5) |
|
|
380 | (1) |
|
|
381 | (1) |
|
|
381 | (2) |
|
|
383 | (2) |
|
|
385 | (16) |
|
|
385 | (1) |
|
|
386 | (1) |
|
Attributes of a Good Identity Policy |
|
|
387 | (1) |
|
|
388 | (1) |
|
|
389 | (4) |
|
Business-Inspired Projects and Processes |
|
|
389 | (1) |
|
|
390 | (1) |
|
|
391 | (1) |
|
|
391 | (1) |
|
Meeting External Requirements |
|
|
392 | (1) |
|
Feedback on Existing Policies |
|
|
392 | (1) |
|
Writing Identity Policies |
|
|
393 | (1) |
|
|
394 | (1) |
|
The Policy Review Framework |
|
|
395 | (1) |
|
Assessing Identity Policies |
|
|
396 | (1) |
|
|
397 | (1) |
|
|
398 | (1) |
|
Policy Completes the System |
|
|
399 | (2) |
|
22 Governing Identity Ecosystems |
|
|
401 | (16) |
|
Governing Administrative Identity Systems |
|
|
402 | (1) |
|
Governing Autonomic Identity Systems |
|
|
403 | (2) |
|
Governing Algorithmic Identity Systems |
|
|
405 | (2) |
|
Governance in a Hybrid Identity Ecosystem |
|
|
407 | (2) |
|
Governing Individual Identity Ecosystems |
|
|
409 | (5) |
|
Credential Fidelity and Confidence |
|
|
410 | (1) |
|
Credential Provenance and Trust |
|
|
410 | (3) |
|
Domain-Specific Trust Frameworks |
|
|
413 | (1) |
|
The Legitimacy of Identity Ecosystems |
|
|
414 | (3) |
|
|
417 | (16) |
|
A Tale of Two Metasystems |
|
|
418 | (4) |
|
The Social Login Metasystem |
|
|
418 | (2) |
|
The Self-Sovereign Identity Metasystem |
|
|
420 | (2) |
|
|
422 | (1) |
|
The Self-Sovereign Internet |
|
|
423 | (5) |
|
Properties of the Self-Sovereign Internet |
|
|
425 | (2) |
|
The Generativity of the Self-Sovereign Internet |
|
|
427 | (1) |
|
|
428 | (4) |
|
The Generativity of Credential Exchange |
|
|
429 | (2) |
|
Self-Sovereign Identity and Generativity |
|
|
431 | (1) |
|
|
432 | (1) |
Index |
|
433 | |