Identity, in the sense that we consider here, includes both who one is, and the attributes or credentials that one holds. To identify X, thus, means to identify who X is (e.g., X is Mary), and to identify features or attributes that X has (Mary is a woman, she is over the age of 21, she is an engineer, she is married.)
In real space some of these attributes are self-identifying. Examples are apparent age, or sex, or size. Tokens of identification make it possible to identify features that are not self-authenticating: a driver's license reveals a presumed state of residence, a passport reveals one's citizenship.
Cyberspace, too, has architectures that facilitate identification. Passwords are one obvious example -- linking knowledge of a word, or pass-phrase, to a presumed identity. Biometric systems are another -- using physical features of a user either to identify or authenticate a user. Digital signatures, and certificates, are a third -- binding encrypted tokens to a person or to attributes of a person.
The differences among these three types of identification are many, and the possible interactions among the three are complex. Some of these architectures are costly to maintain; some preserve the possibility of anonymity better than others. Some facilitate traceability without revealing identity; some tie identity to any traceable feature.
What are the tradeoffs in choosing among these various kinds of credentials? Which would satisfy the various legitimate state interests in identification? Which are consistent with rights to anonymity and free speech? More generally, what are the range of architectures that might satisfy the state's legitimate interests, and the values that these different architectures impact?
Jane Kaufman Winn, Couriers Without Luggage: Negotiable Instruments and Digital Signatures (1998), South Carolina Law Review, Internet Edition. Skim the entire paper, but pay special attention to section III(c): Risk Allocation Systems for Emerging Electronic Commerce Systems.
Ann Davis, The Body as Password, Wired, issue 5.07, July 1997.
| Topic | Presenter | Resources |
|---|---|---|
| Biometrics | Darren Collins | Davis paper (above) and ICSA survey (below) |
| Digital Identity in Cyberspace | Wenona Charles | Paper by Covell, et. al. (below) |
Return to course calendar
Return to course home page
Send comments about this site to 6805-webmaster@zurich.ai.mit.edu.
Last modified: November 7 1999, 11:45 AM