wrapping my head around how Model, Criteria and Framework interact. If you adjust 1, is it always necessary to change the others?
Author: Andrew Hughes
I am exploring the world of mobile digital credentials and trusted identity information management. The internet is changing as authentic identity becomes engrained in risk management equations for online services. My background is in IT security, identity information management, Government IT and systems thinking. My goal for the moment is to find patterns and order in the chaos as new paradigms and architectures for privacy-protective solutions evolve. It's going to be a wild ride.
NSTIC pilot project awards
http://www.nist.gov/itl/nstic-092012.cfm interesting news from NSTIC - 5 pilot projects chosen for funding - very interesting list of topics
GoC authentication via banking cards
Hmmm: a Credential Binder Service for Bank Credential Service Provider authentication to Gov't of Canada RP http://securekeyconcierge.com/
