Requirements engineering for trust management: model, methodology, and reasoning
International Journal of Information Security
Hi-index | 0.00 |
We develop a simple model of the processes by which identity and anonymity are managed by complex systems. We explain New Zealand's recently-proposed Identity Verification Service in terms of our model. We also indicate how our model might be used to guide the architecture of a next generation of trustworthy computing, and how it might be used to define a precise taxonomy of authentication.