<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="http://wiki.cas.mcmaster.ca/skins/common/feed.css?207"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>http://wiki.cas.mcmaster.ca/index.php?feed=atom&amp;target=Brennej&amp;title=Special%3AContributions</id>
		<title>Computing and Software Wiki - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="http://wiki.cas.mcmaster.ca/index.php?feed=atom&amp;target=Brennej&amp;title=Special%3AContributions"/>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Special:Contributions/Brennej"/>
		<updated>2026-04-22T04:11:45Z</updated>
		<subtitle>From Computing and Software Wiki</subtitle>
		<generator>MediaWiki 1.15.1</generator>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Digital_Identity</id>
		<title>Digital Identity</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Digital_Identity"/>
				<updated>2008-04-07T23:47:07Z</updated>
		
		<summary type="html">&lt;p&gt;Brennej:&amp;#32;/* Digital Identity */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Digital Identity =&lt;br /&gt;
Digtial identity refers to the online identity of Internet users. These digital identities are used to verify and validate users when access websites and web services. The concept of digital identity is in the midst of a turning point. The current model, referred to as Identity 1.0, has various identifiable flaws. Identity 1.0 is expected to be replaced by Identity 2.0, which is seen as a revolution in digital identity verification on the Internet.&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==Identity 1.0 ==&lt;br /&gt;
=== 1.0 Philosophy ===&lt;br /&gt;
&lt;br /&gt;
The philosophy of Identity 1.0 is &amp;quot;site-centric&amp;quot;.[1] This refers to the fact the people's digital identities are locked-in with specific sites. Sites are seen as the center of digital identities, they store people's identities for their own purposes. Therefore, people's identities are not shared across various sites, which means people are required to repeatedly enter the same information on each site's particular user registration forms.&lt;br /&gt;
[[Image:site centric.jpg|thumb|300px|center|Figure 1: Identity 1.0 &amp;quot;Identity Silos&amp;quot;]]&lt;br /&gt;
[[Image:Site_centric2.jpg|thumb|300px|center|Figure 2: Identity 1.0 site-centric philosophy]]&lt;br /&gt;
&lt;br /&gt;
=== 1.0 Structure ===&lt;br /&gt;
&lt;br /&gt;
In addition to a less enjoyable user-experience, Identity 1.0 is also flawed in it's ability to scale efficiently. This is due to the fact that each time a user visits a resource (site), the resource must check a directory to identify the user and verify they have permission.&lt;br /&gt;
&lt;br /&gt;
[[Image:Identity10.jpg|thumb|300px|center|Figure 3: Identity 1.0 Structure]]&lt;br /&gt;
&lt;br /&gt;
==Identity 2.0==&lt;br /&gt;
===2.0 Philosphy===&lt;br /&gt;
&lt;br /&gt;
Identity 2.0 represents a major shift from the philosophy of Identity 1.0. Identity 2.0 moves away from the site-centric model, and puts the user at the center. This is a more open and simple philosophy. This allows the user to take their identity from any site to any site[2]; thus allowing for a more efficient and enjoyable experience.&lt;br /&gt;
&lt;br /&gt;
[[Image:user_centric.jpg|thumb|300px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
&lt;br /&gt;
===2.0 Structure ===&lt;br /&gt;
&lt;br /&gt;
Identity 2.0 follows a transparent structure which closely mimics our real-world identification processes. A major advantage here is the flexibility and scalability. &lt;br /&gt;
&lt;br /&gt;
[[Image:Identity20.jpg|thumb|300px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
The following are two examples of the scaling possible with Identity 2.0.&lt;br /&gt;
[[Image:Identity20a.jpg|thumb|300px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
[[Image:Identity20b.jpg|thumb|300px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
&lt;br /&gt;
===Identity 2.0 Security ===&lt;br /&gt;
&lt;br /&gt;
Identity 2.0 is much more secure than its predecessor 1.0. Instead of having their identities controlled by numerous sites, users' identities are stored by a single trusted source. Other sites are only permitted to verify the required about details about identity. Such as &amp;quot;Is the person over 21?&amp;quot;, &amp;quot;Is the person a U.S. resident&amp;quot;. This puts the control of their identies into the hands of the user.&lt;br /&gt;
&lt;br /&gt;
=See Also=&lt;br /&gt;
There are several companies and technologies looking to implement and direct the future of digital identity under the Identity 2.0 movement.&lt;br /&gt;
&lt;br /&gt;
[http://openid.net/ Open ID]&lt;br /&gt;
&lt;br /&gt;
[http://www.sxip.com/ Sxip Identity] &lt;br /&gt;
&lt;br /&gt;
[http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=security/ Oasis] &lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Information_Card/ Information Cards] &lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/ Light-Weight_Identity/LID] &lt;br /&gt;
&lt;br /&gt;
[http://get.live.com/ Windows Live ID] &lt;br /&gt;
&lt;br /&gt;
[http://yadis.org/wiki/Main_Page/ Yadis] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=References=&lt;br /&gt;
[1] [http://www.sxip.com/videos Identity 2.0 Keynote] Sxip Identity Video&lt;br /&gt;
&lt;br /&gt;
[2] [http://en.wikipedia.org/wiki/Identity_2.0/ Identity 2.0] Wikipedia.org&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Digital_identity  Digital Identity] Wikipedia.org&lt;br /&gt;
&lt;br /&gt;
[http://identity20.com/ Identity 2.0] Identity 2.0 Movement&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Brennej|Jeff]] 19:46, 7 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Brennej</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Digital_Identity</id>
		<title>Digital Identity</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Digital_Identity"/>
				<updated>2008-04-07T23:46:29Z</updated>
		
		<summary type="html">&lt;p&gt;Brennej:&amp;#32;/* Digital Identity */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Digital Identity =&lt;br /&gt;
Digtial identity refers to the online identity of Internet users. These digital identities are used to verify and validate users when access websites and web services. The concept of digital identity is in the midst of a turning point. The current model, referred to as Identity 1.0, has various identifiable flaws. Identity 1.0 is expected to be replaced by Identity 2.0, which is seen as a revolution in digital identity verification on the Internet.&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==Identity 1.0 ==&lt;br /&gt;
=== 1.0 Philosophy ===&lt;br /&gt;
&lt;br /&gt;
The philosophy of Identity 1.0 is &amp;quot;site-centric&amp;quot;.[1] This refers to the fact the people's digital identities are locked-in with specific sites. Sites are seen as the center of digital identities, they store people's identities for their own purposes. Therefore, people's identities are not shared across various sites, which means people are required to repeatedly enter the same information on each site's particular user registration forms.&lt;br /&gt;
[[Image:site centric.jpg|thumb|300px|center|Figure 1: Identity 1.0 &amp;quot;Identity Silos&amp;quot;]]&lt;br /&gt;
[[Image:Site_centric2.jpg|thumb|300px|center|Figure 2: Identity 1.0 site-centric philosophy]]&lt;br /&gt;
&lt;br /&gt;
=== 1.0 Structure ===&lt;br /&gt;
&lt;br /&gt;
In addition to a less enjoyable user-experience, Identity 1.0 is also flawed in it's ability to scale efficiently. This is due to the fact that each time a user visits a resource (site), the resource must check a directory to identify the user and verify they have permission.&lt;br /&gt;
&lt;br /&gt;
[[Image:Identity10.jpg|thumb|300px|center|Figure 3: Identity 1.0 Structure]]&lt;br /&gt;
&lt;br /&gt;
==Identity 2.0==&lt;br /&gt;
===2.0 Philosphy===&lt;br /&gt;
&lt;br /&gt;
Identity 2.0 represents a major shift from the philosophy of Identity 1.0. Identity 2.0 moves away from the site-centric model, and puts the user at the center. This is a more open and simple philosophy. This allows the user to take their identity from any site to any site[2]; thus allowing for a more efficient and enjoyable experience.&lt;br /&gt;
&lt;br /&gt;
[[Image:user_centric.jpg|thumb|300px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
&lt;br /&gt;
===2.0 Structure ===&lt;br /&gt;
&lt;br /&gt;
Identity 2.0 follows a transparent structure which closely mimics our real-world identification processes. A major advantage here is the flexibility and scalability. &lt;br /&gt;
&lt;br /&gt;
[[Image:Identity20.jpg|thumb|300px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
The following are two examples of the scaling possible with Identity 2.0.&lt;br /&gt;
[[Image:Identity20a.jpg|thumb|300px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
[[Image:Identity20b.jpg|thumb|300px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
&lt;br /&gt;
===Identity 2.0 Security ===&lt;br /&gt;
&lt;br /&gt;
Identity 2.0 is much more secure than its predecessor 1.0. Instead of having their identities controlled by numerous sites, users' identities are stored by a single trusted source. Other sites are only permitted to verify the required about details about identity. Such as &amp;quot;Is the person over 21?&amp;quot;, &amp;quot;Is the person a U.S. resident&amp;quot;. This puts the control of their identies into the hands of the user.&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
There are several companies and technologies looking to implement and direct the future of digital identity under the Identity 2.0 movement.&lt;br /&gt;
&lt;br /&gt;
[http://openid.net/ Open ID]&lt;br /&gt;
&lt;br /&gt;
[http://www.sxip.com/ Sxip Identity] &lt;br /&gt;
&lt;br /&gt;
[http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=security/ Oasis] &lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Information_Card/ Information Cards] &lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/ Light-Weight_Identity/LID] &lt;br /&gt;
&lt;br /&gt;
[http://get.live.com/ Windows Live ID] &lt;br /&gt;
&lt;br /&gt;
[http://yadis.org/wiki/Main_Page/ Yadis] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[1] [http://www.sxip.com/videos Identity 2.0 Keynote] Sxip Identity Video&lt;br /&gt;
&lt;br /&gt;
[2] [http://en.wikipedia.org/wiki/Identity_2.0/ Identity 2.0] Wikipedia.org&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Digital_identity  Digital Identity] Wikipedia.org&lt;br /&gt;
&lt;br /&gt;
[http://identity20.com/ Identity 2.0] Identity 2.0 Movement&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Brennej|Jeff]] 19:46, 7 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Brennej</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Digital_Identity</id>
		<title>Digital Identity</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Digital_Identity"/>
				<updated>2008-04-07T23:38:23Z</updated>
		
		<summary type="html">&lt;p&gt;Brennej:&amp;#32;/* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Digital Identity =&lt;br /&gt;
Digtial identity refers to the online identity of Internet users. These digital identities are used to verify and validate users when access websites and web services. The concept of digital identity is in the midst of a turning point. The current model, referred to as Identity 1.0, has various identifiable flaws. Identity 1.0 is expected to be replaced by Identity 2.0, which is seen as a revolution in digital identity verification on the Internet.&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==Identity 1.0 ==&lt;br /&gt;
=== 1.0 Philosophy ===&lt;br /&gt;
&lt;br /&gt;
The philosophy of Identity 1.0 is &amp;quot;site-centric&amp;quot;. This refers to the fact the people's digital identities are locked-in with specific sites. Sites are seen as the center of digital identities, they store people's identities for their own purposes. Therefore, people's identities are not shared across various sites, which means people are required to repeatedly enter the same information on each site's particular user registration forms.&lt;br /&gt;
[[Image:site centric.jpg|thumb|300px|center|Figure 1: Identity 1.0 &amp;quot;Identity Silos&amp;quot;]]&lt;br /&gt;
[[Image:Site_centric2.jpg|thumb|300px|center|Figure 2: Identity 1.0 site-centric philosophy]]&lt;br /&gt;
&lt;br /&gt;
=== 1.0 Structure ===&lt;br /&gt;
&lt;br /&gt;
In addition to a less enjoyable user-experience, Identity 1.0 is also flawed in it's ability to scale efficiently. This is due to the fact that each time a user visits a resource (site), the resource must check a directory to identify the user and verify they have permission.&lt;br /&gt;
&lt;br /&gt;
[[Image:Identity10.jpg|thumb|300px|center|Figure 3: Identity 1.0 Structure]]&lt;br /&gt;
&lt;br /&gt;
==Identity 2.0==&lt;br /&gt;
===2.0 Philosphy===&lt;br /&gt;
&lt;br /&gt;
Identity 2.0 represents a major shift from the philosophy of Identity 1.0. Identity 2.0 moves away from the site-centric model, and puts the user at the center. This is a more open and simple philosophy. This allows the user to take their identity from any site to any site; thus allowing for a more efficient and enjoyable experience.&lt;br /&gt;
&lt;br /&gt;
[[Image:user_centric.jpg|thumb|300px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
&lt;br /&gt;
===2.0 Structure ===&lt;br /&gt;
&lt;br /&gt;
Identity 2.0 follows a transparent structure which closely mimics our real-world identification processes. A major advantage here is the flexibility and scalability. &lt;br /&gt;
&lt;br /&gt;
[[Image:Identity20.jpg|thumb|300px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
The following are two examples of the scaling possible with Identity 2.0.&lt;br /&gt;
[[Image:Identity20a.jpg|thumb|300px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
[[Image:Identity20b.jpg|thumb|300px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
&lt;br /&gt;
===Identity 2.0 Security ===&lt;br /&gt;
&lt;br /&gt;
Identity 2.0 is much more secure than its predecessor 1.0. Instead of having their identities controlled by numerous sites, users' identities are stored by a single trusted source. Other sites are only permitted to verify the required about details about identity. Such as &amp;quot;Is the person over 21?&amp;quot;, &amp;quot;Is the person a U.S. resident&amp;quot;. This puts the control of their identies into the hands of the user.&lt;br /&gt;
&lt;br /&gt;
==Future==&lt;br /&gt;
There are several companies and technologies looking to implement and direct the future of digital identity under the Identity 2.0 movement.&lt;br /&gt;
&lt;br /&gt;
[http://openid.net/ Open ID]&lt;br /&gt;
&lt;br /&gt;
[http://www.sxip.com/ Sxip Identity] &lt;br /&gt;
&lt;br /&gt;
[http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=security/ Oasis] &lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Information_Card/ Information Cards] &lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/ Light-Weight_Identity/LID] &lt;br /&gt;
&lt;br /&gt;
[http://get.live.com/ Windows Live ID] &lt;br /&gt;
&lt;br /&gt;
[http://yadis.org/wiki/Main_Page/ Yadis] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Identity_2.0/ Identity 2.0] Wikipedia.org&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Digital_identity  Digital Identity] Wikipedia.org&lt;br /&gt;
&lt;br /&gt;
[http://identity20.com/ Identity 2.0] Identity 2.0 Movement&lt;br /&gt;
&lt;br /&gt;
[http://www.sxip.com/videos Identity 2.0 Keynote] Sxip Identity Video&lt;/div&gt;</summary>
		<author><name>Brennej</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Digital_Identity</id>
		<title>Digital Identity</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Digital_Identity"/>
				<updated>2008-04-07T23:37:54Z</updated>
		
		<summary type="html">&lt;p&gt;Brennej:&amp;#32;/* Identity 2.0 Security */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Digital Identity =&lt;br /&gt;
Digtial identity refers to the online identity of Internet users. These digital identities are used to verify and validate users when access websites and web services. The concept of digital identity is in the midst of a turning point. The current model, referred to as Identity 1.0, has various identifiable flaws. Identity 1.0 is expected to be replaced by Identity 2.0, which is seen as a revolution in digital identity verification on the Internet.&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==Identity 1.0 ==&lt;br /&gt;
=== 1.0 Philosophy ===&lt;br /&gt;
&lt;br /&gt;
The philosophy of Identity 1.0 is &amp;quot;site-centric&amp;quot;. This refers to the fact the people's digital identities are locked-in with specific sites. Sites are seen as the center of digital identities, they store people's identities for their own purposes. Therefore, people's identities are not shared across various sites, which means people are required to repeatedly enter the same information on each site's particular user registration forms.&lt;br /&gt;
[[Image:site centric.jpg|thumb|300px|center|Figure 1: Identity 1.0 &amp;quot;Identity Silos&amp;quot;]]&lt;br /&gt;
[[Image:Site_centric2.jpg|thumb|300px|center|Figure 2: Identity 1.0 site-centric philosophy]]&lt;br /&gt;
&lt;br /&gt;
=== 1.0 Structure ===&lt;br /&gt;
&lt;br /&gt;
In addition to a less enjoyable user-experience, Identity 1.0 is also flawed in it's ability to scale efficiently. This is due to the fact that each time a user visits a resource (site), the resource must check a directory to identify the user and verify they have permission.&lt;br /&gt;
&lt;br /&gt;
[[Image:Identity10.jpg|thumb|300px|center|Figure 3: Identity 1.0 Structure]]&lt;br /&gt;
&lt;br /&gt;
==Identity 2.0==&lt;br /&gt;
===2.0 Philosphy===&lt;br /&gt;
&lt;br /&gt;
Identity 2.0 represents a major shift from the philosophy of Identity 1.0. Identity 2.0 moves away from the site-centric model, and puts the user at the center. This is a more open and simple philosophy. This allows the user to take their identity from any site to any site; thus allowing for a more efficient and enjoyable experience.&lt;br /&gt;
&lt;br /&gt;
[[Image:user_centric.jpg|thumb|300px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
&lt;br /&gt;
===2.0 Structure ===&lt;br /&gt;
&lt;br /&gt;
Identity 2.0 follows a transparent structure which closely mimics our real-world identification processes. A major advantage here is the flexibility and scalability. &lt;br /&gt;
&lt;br /&gt;
[[Image:Identity20.jpg|thumb|300px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
The following are two examples of the scaling possible with Identity 2.0.&lt;br /&gt;
[[Image:Identity20a.jpg|thumb|300px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
[[Image:Identity20b.jpg|thumb|300px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
&lt;br /&gt;
===Identity 2.0 Security ===&lt;br /&gt;
&lt;br /&gt;
Identity 2.0 is much more secure than its predecessor 1.0. Instead of having their identities controlled by numerous sites, users' identities are stored by a single trusted source. Other sites are only permitted to verify the required about details about identity. Such as &amp;quot;Is the person over 21?&amp;quot;, &amp;quot;Is the person a U.S. resident&amp;quot;. This puts the control of their identies into the hands of the user.&lt;br /&gt;
&lt;br /&gt;
==Future==&lt;br /&gt;
There are several companies and technologies looking to implement and direct the future of digital identity under the Identity 2.0 movement.&lt;br /&gt;
&lt;br /&gt;
[http://openid.net/ Open ID]&lt;br /&gt;
&lt;br /&gt;
[http://www.sxip.com/ Sxip Identity] &lt;br /&gt;
&lt;br /&gt;
[http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=security/ Oasis] &lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Information_Card/ Information Cards] &lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/ Light-Weight_Identity/LID] &lt;br /&gt;
&lt;br /&gt;
[http://get.live.com/ Windows Live ID] &lt;br /&gt;
&lt;br /&gt;
[http://yadis.org/wiki/Main_Page/ Yadis] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Identity_2.0/ Identity 2.0] Wikipedia.org&lt;br /&gt;
[http://en.wikipedia.org/wiki/Digital_identity  Digital Identity] Wikipedia.org&lt;br /&gt;
[http://identity20.com/ Identity 2.0] Identity 2.0 Movement&lt;br /&gt;
[http://www.sxip.com/videos Identity 2.0 Keynote] Sxip Identity Video&lt;/div&gt;</summary>
		<author><name>Brennej</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Identity_2.0</id>
		<title>Identity 2.0</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Identity_2.0"/>
				<updated>2008-04-05T19:48:03Z</updated>
		
		<summary type="html">&lt;p&gt;Brennej:&amp;#32;Removing all content from page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Brennej</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Digital_Identity</id>
		<title>Digital Identity</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Digital_Identity"/>
				<updated>2008-04-05T19:47:24Z</updated>
		
		<summary type="html">&lt;p&gt;Brennej:&amp;#32;New page: = Digital Identity = Digtial identity refers to the online identity of Internet users. These digital identities are used to verify and validate users when access websites and web services....&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Digital Identity =&lt;br /&gt;
Digtial identity refers to the online identity of Internet users. These digital identities are used to verify and validate users when access websites and web services. The concept of digital identity is in the midst of a turning point. The current model, referred to as Identity 1.0, has various identifiable flaws. Identity 1.0 is expected to be replaced by Identity 2.0, which is seen as a revolution in digital identity verification on the Internet.&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==Identity 1.0 ==&lt;br /&gt;
=== 1.0 Philosophy ===&lt;br /&gt;
&lt;br /&gt;
The philosophy of Identity 1.0 is &amp;quot;site-centric&amp;quot;. This refers to the fact the people's digital identities are locked-in with specific sites. Sites are seen as the center of digital identities, they store people's identities for their own purposes. Therefore, people's identities are not shared across various sites, which means people are required to repeatedly enter the same information on each site's particular user registration forms.&lt;br /&gt;
[[Image:site centric.jpg|thumb|300px|center|Figure 1: Identity 1.0 &amp;quot;Identity Silos&amp;quot;]]&lt;br /&gt;
[[Image:Site_centric2.jpg|thumb|300px|center|Figure 2: Identity 1.0 site-centric philosophy]]&lt;br /&gt;
&lt;br /&gt;
=== 1.0 Structure ===&lt;br /&gt;
&lt;br /&gt;
In addition to a less enjoyable user-experience, Identity 1.0 is also flawed in it's ability to scale efficiently. This is due to the fact that each time a user visits a resource (site), the resource must check a directory to identify the user and verify they have permission.&lt;br /&gt;
&lt;br /&gt;
[[Image:Identity10.jpg|thumb|300px|center|Figure 3: Identity 1.0 Structure]]&lt;br /&gt;
&lt;br /&gt;
==Identity 2.0==&lt;br /&gt;
===2.0 Philosphy===&lt;br /&gt;
&lt;br /&gt;
Identity 2.0 represents a major shift from the philosophy of Identity 1.0. Identity 2.0 moves away from the site-centric model, and puts the user at the center. This is a more open and simple philosophy. This allows the user to take their identity from any site to any site; thus allowing for a more efficient and enjoyable experience.&lt;br /&gt;
&lt;br /&gt;
[[Image:user_centric.jpg|thumb|300px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
&lt;br /&gt;
===2.0 Structure ===&lt;br /&gt;
&lt;br /&gt;
Identity 2.0 follows a transparent structure which closely mimics our real-world identification processes. A major advantage here is the flexibility and scalability. &lt;br /&gt;
&lt;br /&gt;
[[Image:Identity20.jpg|thumb|300px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
The following are two examples of the scaling possible with Identity 2.0.&lt;br /&gt;
[[Image:Identity20a.jpg|thumb|300px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
[[Image:Identity20b.jpg|thumb|300px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
&lt;br /&gt;
===Identity 2.0 Security ===&lt;br /&gt;
&lt;br /&gt;
Identity 2.0 is much more secure than its predecessor 1.0. Instead of having their identities controlled by numerous sites, users' identities are stored by a trusted source. Other sites are only permitted to verify the required about details about identity. Such as &amp;quot;Is the person over 21?&amp;quot;, &amp;quot;Is the person a U.S. resident&amp;quot;. This puts the control of their identies into the hands of the user.&lt;br /&gt;
&lt;br /&gt;
==Future==&lt;br /&gt;
There are several companies and technologies looking to implement and direct the future of digital identity under the Identity 2.0 movement.&lt;br /&gt;
&lt;br /&gt;
[http://openid.net/ Open ID]&lt;br /&gt;
&lt;br /&gt;
[http://www.sxip.com/ Sxip Identity] &lt;br /&gt;
&lt;br /&gt;
[http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=security/ Oasis] &lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Information_Card/ Information Cards] &lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/ Light-Weight_Identity/LID] &lt;br /&gt;
&lt;br /&gt;
[http://get.live.com/ Windows Live ID] &lt;br /&gt;
&lt;br /&gt;
[http://yadis.org/wiki/Main_Page/ Yadis] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Identity_2.0/ Identity 2.0] Wikipedia.org&lt;br /&gt;
[http://en.wikipedia.org/wiki/Digital_identity  Digital Identity] Wikipedia.org&lt;br /&gt;
[http://identity20.com/ Identity 2.0] Identity 2.0 Movement&lt;br /&gt;
[http://www.sxip.com/videos Identity 2.0 Keynote] Sxip Identity Video&lt;/div&gt;</summary>
		<author><name>Brennej</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Identity_2.0</id>
		<title>Identity 2.0</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Identity_2.0"/>
				<updated>2008-04-05T19:46:01Z</updated>
		
		<summary type="html">&lt;p&gt;Brennej:&amp;#32;/* Digital Identity */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Digital Identity =&lt;br /&gt;
Digtial identity refers to the online identity of Internet users. These digital identities are used to verify and validate users when access websites and web services. The concept of digital identity is in the midst of a turning point. The current model, referred to as Identity 1.0, has various identifiable flaws. Identity 1.0 is expected to be replaced by Identity 2.0, which is seen as a revolution in digital identity verification on the Internet.&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==Identity 1.0 ==&lt;br /&gt;
=== 1.0 Philosophy ===&lt;br /&gt;
&lt;br /&gt;
The philosophy of Identity 1.0 is &amp;quot;site-centric&amp;quot;. This refers to the fact the people's digital identities are locked-in with specific sites. Sites are seen as the center of digital identities, they store people's identities for their own purposes. Therefore, people's identities are not shared across various sites, which means people are required to repeatedly enter the same information on each site's particular user registration forms.&lt;br /&gt;
[[Image:site centric.jpg|thumb|300px|center|Figure 1: Identity 1.0 &amp;quot;Identity Silos&amp;quot;]]&lt;br /&gt;
[[Image:Site_centric2.jpg|thumb|300px|center|Figure 2: Identity 1.0 site-centric philosophy]]&lt;br /&gt;
&lt;br /&gt;
=== 1.0 Structure ===&lt;br /&gt;
&lt;br /&gt;
In addition to a less enjoyable user-experience, Identity 1.0 is also flawed in it's ability to scale efficiently. This is due to the fact that each time a user visits a resource (site), the resource must check a directory to identify the user and verify they have permission.&lt;br /&gt;
&lt;br /&gt;
[[Image:Identity10.jpg|thumb|300px|center|Figure 3: Identity 1.0 Structure]]&lt;br /&gt;
&lt;br /&gt;
==Identity 2.0==&lt;br /&gt;
===2.0 Philosphy===&lt;br /&gt;
&lt;br /&gt;
Identity 2.0 represents a major shift from the philosophy of Identity 1.0. Identity 2.0 moves away from the site-centric model, and puts the user at the center. This is a more open and simple philosophy. This allows the user to take their identity from any site to any site; thus allowing for a more efficient and enjoyable experience.&lt;br /&gt;
&lt;br /&gt;
[[Image:user_centric.jpg|thumb|300px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
&lt;br /&gt;
===2.0 Structure ===&lt;br /&gt;
&lt;br /&gt;
Identity 2.0 follows a transparent structure which closely mimics our real-world identification processes. A major advantage here is the flexibility and scalability. &lt;br /&gt;
&lt;br /&gt;
[[Image:Identity20.jpg|thumb|300px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
The following are two examples of the scaling possible with Identity 2.0.&lt;br /&gt;
[[Image:Identity20a.jpg|thumb|300px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
[[Image:Identity20b.jpg|thumb|300px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
&lt;br /&gt;
===Identity 2.0 Security ===&lt;br /&gt;
&lt;br /&gt;
Identity 2.0 is much more secure than its predecessor 1.0. Instead of having their identities controlled by numerous sites, users' identities are stored by a trusted source. Other sites are only permitted to verify the required about details about identity. Such as &amp;quot;Is the person over 21?&amp;quot;, &amp;quot;Is the person a U.S. resident&amp;quot;. This puts the control of their identies into the hands of the user.&lt;br /&gt;
&lt;br /&gt;
==Future==&lt;br /&gt;
There are several companies and technologies looking to implement and direct the future of digital identity under the Identity 2.0 movement.&lt;br /&gt;
&lt;br /&gt;
[http://openid.net/ Open ID]&lt;br /&gt;
&lt;br /&gt;
[http://www.sxip.com/ Sxip Identity] &lt;br /&gt;
&lt;br /&gt;
[http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=security/ Oasis] &lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Information_Card/ Information Cards] &lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/ Light-Weight_Identity/LID] &lt;br /&gt;
&lt;br /&gt;
[http://get.live.com/ Windows Live ID] &lt;br /&gt;
&lt;br /&gt;
[http://yadis.org/wiki/Main_Page/ Yadis] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Identity_2.0/ Identity 2.0] Wikipedia.org&lt;br /&gt;
[http://en.wikipedia.org/wiki/Digital_identity  Digital Identity] Wikipedia.org&lt;br /&gt;
[http://identity20.com/ Identity 2.0] Identity 2.0 Movement&lt;br /&gt;
[http://www.sxip.com/videos Identity 2.0 Keynote] Sxip Identity Video&lt;/div&gt;</summary>
		<author><name>Brennej</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Identity_2.0</id>
		<title>Identity 2.0</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Identity_2.0"/>
				<updated>2008-04-05T19:45:20Z</updated>
		
		<summary type="html">&lt;p&gt;Brennej:&amp;#32;/* Digital Identity */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Digital Identity =&lt;br /&gt;
Digtial identity refers to the online identity of Internet users. These digital identities are used to verify and validate users when access websites and web services. The concept of digital identity is in the midst of a turning point. The current model, referred to as Identity 1.0, has various identifiable flaws. Identity 1.0 is expected to be replaced by Identity 2.0, which is seen as a revolution in digital identity verification on the Internet.&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==Identity 1.0 ==&lt;br /&gt;
=== 1.0 Philosophy ===&lt;br /&gt;
&lt;br /&gt;
The philosophy of Identity 1.0 is &amp;quot;site-centric&amp;quot;. This refers to the fact the people's digital identities are locked-in with specific sites. Sites are seen as the center of digital identities, they store people's identities for their own purposes. Therefore, people's identities are not shared across various sites, which means people are required to repeatedly enter the same information on each site's particular user registration forms.&lt;br /&gt;
[[Image:site centric.jpg|thumb|300px|center|Figure 1: Identity 1.0 &amp;quot;Identity Silos&amp;quot;]]&lt;br /&gt;
[[Image:Site_centric2.jpg|thumb|300px|center|Figure 2: Identity 1.0 site-centric philosophy]]&lt;br /&gt;
&lt;br /&gt;
=== 1.0 Structure ===&lt;br /&gt;
&lt;br /&gt;
In addition to a less enjoyable user-experience, Identity 1.0 is also flawed in it's ability to scale efficiently. This is due to the fact that each time a user visits a resource (site), the resource must check a directory to identify the user and verify they have permission.&lt;br /&gt;
&lt;br /&gt;
[[Image:Identity10.jpg|thumb|300px|center|Figure 3: Identity 1.0 Structure]]&lt;br /&gt;
&lt;br /&gt;
==Identity 2.0==&lt;br /&gt;
==2.0 Philosphy==&lt;br /&gt;
&lt;br /&gt;
Identity 2.0 represents a major shift from the philosophy of Identity 1.0. Identity 2.0 moves away from the site-centric model, and puts the user at the center. This is a more open and simple philosophy. This allows the user to take their identity from any site to any site; thus allowing for a more efficient and enjoyable experience.&lt;br /&gt;
&lt;br /&gt;
[[Image:user_centric.jpg|thumb|300px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
&lt;br /&gt;
==2.0 Structure ==&lt;br /&gt;
&lt;br /&gt;
Identity 2.0 follows a transparent structure which closely mimics our real-world identification processes. A major advantage here is the flexibility and scalability. &lt;br /&gt;
&lt;br /&gt;
[[Image:Identity20.jpg|thumb|300px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
The following are two examples of the scaling possible with Identity 2.0.&lt;br /&gt;
[[Image:Identity20a.jpg|thumb|300px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
[[Image:Identity20b.jpg|thumb|300px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
&lt;br /&gt;
==Identity 2.0 Security ==&lt;br /&gt;
&lt;br /&gt;
Identity 2.0 is much more secure than its predecessor 1.0. Instead of having their identities controlled by numerous sites, users' identities are stored by a trusted source. Other sites are only permitted to verify the required about details about identity. Such as &amp;quot;Is the person over 21?&amp;quot;, &amp;quot;Is the person a U.S. resident&amp;quot;. This puts the control of their identies into the hands of the user.&lt;br /&gt;
&lt;br /&gt;
==Future==&lt;br /&gt;
There are several companies and technologies looking to implement and direct the future of digital identity under the Identity 2.0 movement.&lt;br /&gt;
&lt;br /&gt;
[http://openid.net/ Open ID]&lt;br /&gt;
&lt;br /&gt;
[http://www.sxip.com/ Sxip Identity] &lt;br /&gt;
&lt;br /&gt;
[http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=security/ Oasis] &lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Information_Card/ Information Cards] &lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/ Light-Weight_Identity/LID] &lt;br /&gt;
&lt;br /&gt;
[http://get.live.com/ Windows Live ID] &lt;br /&gt;
&lt;br /&gt;
[http://yadis.org/wiki/Main_Page/ Yadis] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Identity_2.0/ Identity 2.0] Wikipedia.org&lt;br /&gt;
[http://en.wikipedia.org/wiki/Digital_identity  Digital Identity] Wikipedia.org&lt;br /&gt;
[http://identity20.com/ Identity 2.0] Identity 2.0 Movement&lt;br /&gt;
[http://www.sxip.com/videos Identity 2.0 Keynote] Sxip Identity Video&lt;/div&gt;</summary>
		<author><name>Brennej</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Identity_2.0</id>
		<title>Identity 2.0</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Identity_2.0"/>
				<updated>2008-04-05T19:40:02Z</updated>
		
		<summary type="html">&lt;p&gt;Brennej:&amp;#32;/* Identity 2.0 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Digital Identity =&lt;br /&gt;
Digtial identity refers to the online identity of Internet users. These digital identities are used to verify and validate users when access websites and web services. The concept of digital identity is in the midst of a turning point. The current model, referred to as Identity 1.0, has various identifiable flaws. Identity 1.0 is expected to be replaced by Identity 2.0, which is seen as a revolution in digital identity verification on the Internet.&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==Identity 1.0 ==&lt;br /&gt;
=== 1.0 Philosophy ===&lt;br /&gt;
&lt;br /&gt;
The philosophy of Identity 1.0 is &amp;quot;site-centric&amp;quot;. This refers to the fact the people's digital identities are locked-in with specific sites. Sites are seen as the center of digital identities, they store people's identities for their own purposes. Therefore, people's identities are not shared across various sites, which means people are required to repeatedly enter the same information on each site's particular user registration forms.&lt;br /&gt;
[[Image:site centric.jpg|thumb|300px|center|Figure 1: Identity 1.0 &amp;quot;Identity Silos&amp;quot;]]&lt;br /&gt;
[[Image:Site_centric2.jpg|thumb|300px|center|Figure 2: Identity 1.0 site-centric philosophy]]&lt;br /&gt;
&lt;br /&gt;
=== 1.0 Structure ===&lt;br /&gt;
&lt;br /&gt;
In addition to a less enjoyable user-experience, Identity 1.0 is also flawed in it's ability to scale efficiently. This is due to the fact that each time a user visits a resource (site), the resource must check a directory to identify the user and verify they have permission.&lt;br /&gt;
&lt;br /&gt;
[[Image:Identity10.jpg|thumb|300px|none|Figure 3: Identity 1.0 Structure]]&lt;br /&gt;
&lt;br /&gt;
==Identity 2.0==&lt;br /&gt;
==2.0 Philosphy==&lt;br /&gt;
&lt;br /&gt;
Identity 2.0 represents a major shift from the philosophy of Identity 1.0. Identity 2.0 moves away from the site-centric model, and puts the user at the center. This is a more open and simple philosophy. This allows the user to take their identity from any site to any site; thus allowing for a more efficient and enjoyable experience.&lt;br /&gt;
&lt;br /&gt;
[[Image:user_centric.jpg|thumb|450px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
&lt;br /&gt;
==2.0 Structure ==&lt;br /&gt;
&lt;br /&gt;
Identity 2.0 follows a transparent structure which closely mimics our real-world identification processes. A major advantage here is the flexibility and scalability. &lt;br /&gt;
&lt;br /&gt;
[[Image:Identity20.jpg|thumb|300px|none|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
The following are two examples of the scaling possible with Identity 2.0.&lt;br /&gt;
[[Image:Identity20a.jpg|thumb|300px|none|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
[[Image:Identity20b.jpg|thumb|300px|none|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
&lt;br /&gt;
==Identity 2.0 Security ==&lt;br /&gt;
&lt;br /&gt;
Identity 2.0 is much more secure than its predecessor 1.0. Instead of having their identities controlled by numerous sites, users' identities are stored by a trusted source. Other sites are only permitted to verify the required about details about identity. Such as &amp;quot;Is the person over 21?&amp;quot;, &amp;quot;Is the person a U.S. resident&amp;quot;. This puts the control of their identies into the hands of the user.&lt;br /&gt;
&lt;br /&gt;
==Future==&lt;br /&gt;
There are several companies and technologies looking to implement and direct the future of Identity 2.0.&lt;br /&gt;
&lt;br /&gt;
[http://openid.net/ Open ID]&lt;br /&gt;
&lt;br /&gt;
[http://www.sxip.com/ Sxip Identity] &lt;br /&gt;
&lt;br /&gt;
[http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=security/ Oasis] &lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Information_Card/ Information Cards] &lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/ Light-Weight_Identity/LID] &lt;br /&gt;
&lt;br /&gt;
[http://get.live.com/ Windows Live ID] &lt;br /&gt;
&lt;br /&gt;
[http://yadis.org/wiki/Main_Page/ Yadis] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Identity_2.0/ Identity 2.0] Wikipedia.org&lt;/div&gt;</summary>
		<author><name>Brennej</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Identity_2.0</id>
		<title>Identity 2.0</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Identity_2.0"/>
				<updated>2008-04-05T19:31:25Z</updated>
		
		<summary type="html">&lt;p&gt;Brennej:&amp;#32;/* Identity 2.0 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Identity 2.0 =&lt;br /&gt;
'''Identity 2.0''' is the forthcoming revolution in digital identity verification on the Internet.&lt;br /&gt;
__TOC__&lt;br /&gt;
The major shift from Identity 1.0 is the move from site-centric identity silos (figures 1 and 2) to an open concept user-centric structure, where the user can move their identity from any site to any site (figure 3).&lt;br /&gt;
[[Image:site centric.jpg|thumb|300px|center|Figure 1: Identity 1.0 site-centric]]&lt;br /&gt;
[[Image:Site_centric2.jpg|thumb|300px|center|Figure 2: Identity 1.0 site-centric]]&lt;br /&gt;
[[Image:user_centric.jpg|thumb|450px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Identity 1.0 Philosophy==&lt;br /&gt;
&lt;br /&gt;
The philosophy of Identity 1.0 is &amp;quot;site-centric&amp;quot;. This refers to the fact the people's digital identities are locked-in with specific sites. Sites are seen as the center of digital identities, they store people's identities for their own purposes. Therefore, people's identities are not shared across various sites, which means people are required to repeatedly enter the same information on each site's particular user registration forms.&lt;br /&gt;
[[Image:site centric.jpg|thumb|300px|center|Figure 1: Identity 1.0 &amp;quot;Identity Silos&amp;quot;]]&lt;br /&gt;
[[Image:Site_centric2.jpg|thumb|300px|center|Figure 2: Identity 1.0 site-centric philosophy]]&lt;br /&gt;
&lt;br /&gt;
==Identity 1.0 Structure==&lt;br /&gt;
&lt;br /&gt;
In addition to a less enjoyable user-experience, Identity 1.0 is also flawed in it's ability to scale efficiently. This is due to the fact that each time a user visits a resource (site), the resource must check a directory to identify the user and verify they have permission.&lt;br /&gt;
&lt;br /&gt;
[[Image:Identity10.jpg|thumb|300px|none|Figure 3: Identity 1.0 Structure]]&lt;br /&gt;
&lt;br /&gt;
==Identity 2.0 Philosphy==&lt;br /&gt;
&lt;br /&gt;
Identity 2.0 represents a major shift from the philosophy of Identity 1.0. Identity 2.0 moves away from the site-centric model, and puts the user at the center. This is a more open and simple philosophy. This allows the user to take their identity from any site to any site; thus allowing for a more efficient and enjoyable experience.&lt;br /&gt;
&lt;br /&gt;
[[Image:user_centric.jpg|thumb|450px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
&lt;br /&gt;
==Identity 2.0 Structure ==&lt;br /&gt;
&lt;br /&gt;
Identity 2.0 follows a transparent structure which closely mimics our real-world identification processes. A major advantage here is the flexibility and scalability. &lt;br /&gt;
&lt;br /&gt;
[[Image:Identity20.jpg|thumb|300px|none|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
The following are two examples of the scaling possible with Identity 2.0.&lt;br /&gt;
[[Image:Identity20a.jpg|thumb|300px|none|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
[[Image:Identity20b.jpg|thumb|300px|none|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
&lt;br /&gt;
==Identity 2.0 Security ==&lt;br /&gt;
&lt;br /&gt;
Identity 2.0 is much more secure than its predecessor 1.0. Instead of having their identities controlled by numerous sites, users' identities are stored by a trusted source. Other sites are only permitted to verify the required about details about identity. Such as &amp;quot;Is the person over 21?&amp;quot;, &amp;quot;Is the person a U.S. resident&amp;quot;. This puts the control of their identies into the hands of the user.&lt;br /&gt;
&lt;br /&gt;
==Future==&lt;br /&gt;
There are several companies and technologies looking to implement and direct the future of Identity 2.0.&lt;br /&gt;
&lt;br /&gt;
[http://openid.net/ Open ID]&lt;br /&gt;
&lt;br /&gt;
[http://www.sxip.com/ Sxip Identity] &lt;br /&gt;
&lt;br /&gt;
[http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=security/ Oasis] &lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Information_Card/ Information Cards] &lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/ Light-Weight_Identity/LID] &lt;br /&gt;
&lt;br /&gt;
[http://get.live.com/ Windows Live ID] &lt;br /&gt;
&lt;br /&gt;
[http://yadis.org/wiki/Main_Page/ Yadis] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Identity_2.0/ Identity 2.0] Wikipedia.org&lt;/div&gt;</summary>
		<author><name>Brennej</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Identity_2.0</id>
		<title>Identity 2.0</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Identity_2.0"/>
				<updated>2008-04-05T19:04:24Z</updated>
		
		<summary type="html">&lt;p&gt;Brennej:&amp;#32;/* Identity 2.0 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Identity 2.0 =&lt;br /&gt;
'''Identity 2.0''' is the forthcoming revolution in digital identity verification on the Internet.&lt;br /&gt;
__TOC__&lt;br /&gt;
The major shift from Identity 1.0 is the move from site-centric identity silos (figures 1 and 2) to an open concept user-centric structure, where the user can move their identity from any site to any site (figure 3).&lt;br /&gt;
[[Image:site centric.jpg|thumb|300px|center|Figure 1: Identity 1.0 site-centric]]&lt;br /&gt;
[[Image:Site_centric2.jpg|thumb|300px|center|Figure 2: Identity 1.0 site-centric]]&lt;br /&gt;
[[Image:user_centric.jpg|thumb|450px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Identity 1.0 Structure==&lt;br /&gt;
The current digital identity structure of the Internet follows an &amp;quot;opaque policy&amp;quot;. People's identities are site-centric and is not shared across the sites. This is a hassle for users because they have to register at each site, filling-in the same info about themselves each time.&lt;br /&gt;
&lt;br /&gt;
In addition to a less enjoyable user-experience, Identity 1.0 is also flawed in it's ability to scale efficiently.&lt;br /&gt;
&lt;br /&gt;
[[Image:Identity10.jpg|thumb|300px|none|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
&lt;br /&gt;
==Identity 2.0 Structure==&lt;br /&gt;
Identity 2.0 follows a transparent structure which closely mimics our real-world identification processes.&lt;br /&gt;
&lt;br /&gt;
[[Image:Identity20.jpg|thumb|300px|none|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
A major advantage with Identity 2.0 is its flexibility and ability to scale. This can be accomplished in the following two ways.&lt;br /&gt;
[[Image:Identity20a.jpg|thumb|300px|none|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
[[Image:Identity20b.jpg|thumb|300px|none|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
&lt;br /&gt;
==Future==&lt;br /&gt;
There are several companies and technologies looking to implement and direct the future of Identity 2.0.&lt;br /&gt;
&lt;br /&gt;
[http://openid.net/ Open ID]&lt;br /&gt;
&lt;br /&gt;
[http://www.sxip.com/ Sxip Identity] &lt;br /&gt;
&lt;br /&gt;
[http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=security/ Oasis] &lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Information_Card/ Information Cards] &lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/ Light-Weight_Identity/LID] &lt;br /&gt;
&lt;br /&gt;
[http://get.live.com/ Windows Live ID] &lt;br /&gt;
&lt;br /&gt;
[http://yadis.org/wiki/Main_Page/ Yadis] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Identity_2.0/ Identity 2.0] Wikipedia.org&lt;/div&gt;</summary>
		<author><name>Brennej</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Identity_2.0</id>
		<title>Identity 2.0</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Identity_2.0"/>
				<updated>2008-04-05T19:03:29Z</updated>
		
		<summary type="html">&lt;p&gt;Brennej:&amp;#32;/* Identity 2.0 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Identity 2.0 =&lt;br /&gt;
'''Identity 2.0''' is the forthcoming revolution in online identity verification.&lt;br /&gt;
__TOC__&lt;br /&gt;
The major shift from Identity 1.0 is the move from site-centric identity silos (figures 1 and 2) to an open concept user-centric structure, where the user can move their identity from any site to any site (figure 3).&lt;br /&gt;
[[Image:site centric.jpg|thumb|300px|center|Figure 1: Identity 1.0 site-centric]]&lt;br /&gt;
[[Image:Site_centric2.jpg|thumb|300px|center|Figure 2: Identity 1.0 site-centric]]&lt;br /&gt;
[[Image:user_centric.jpg|thumb|450px|center|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Identity 1.0 Structure==&lt;br /&gt;
The current digital identity structure of the Internet follows an &amp;quot;opaque policy&amp;quot;. People's identities are site-centric and is not shared across the sites. This is a hassle for users because they have to register at each site, filling-in the same info about themselves each time.&lt;br /&gt;
&lt;br /&gt;
In addition to a less enjoyable user-experience, Identity 1.0 is also flawed in it's ability to scale efficiently.&lt;br /&gt;
&lt;br /&gt;
[[Image:Identity10.jpg|thumb|300px|none|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
&lt;br /&gt;
==Identity 2.0 Structure==&lt;br /&gt;
Identity 2.0 follows a transparent structure which closely mimics our real-world identification processes.&lt;br /&gt;
&lt;br /&gt;
[[Image:Identity20.jpg|thumb|300px|none|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
A major advantage with Identity 2.0 is its flexibility and ability to scale. This can be accomplished in the following two ways.&lt;br /&gt;
[[Image:Identity20a.jpg|thumb|300px|none|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
[[Image:Identity20b.jpg|thumb|300px|none|Figure 3: Identity 2.0 user-centric]]&lt;br /&gt;
&lt;br /&gt;
==Future==&lt;br /&gt;
There are several companies and technologies looking to implement and direct the future of Identity 2.0.&lt;br /&gt;
&lt;br /&gt;
[http://openid.net/ Open ID]&lt;br /&gt;
&lt;br /&gt;
[http://www.sxip.com/ Sxip Identity] &lt;br /&gt;
&lt;br /&gt;
[http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=security/ Oasis] &lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Information_Card/ Information Cards] &lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/ Light-Weight_Identity/LID] &lt;br /&gt;
&lt;br /&gt;
[http://get.live.com/ Windows Live ID] &lt;br /&gt;
&lt;br /&gt;
[http://yadis.org/wiki/Main_Page/ Yadis] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Identity_2.0/ Identity 2.0] Wikipedia.org&lt;/div&gt;</summary>
		<author><name>Brennej</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Identity20a.jpg</id>
		<title>File:Identity20a.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Identity20a.jpg"/>
				<updated>2008-04-05T18:41:28Z</updated>
		
		<summary type="html">&lt;p&gt;Brennej:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Brennej</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Identity20b.jpg</id>
		<title>File:Identity20b.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Identity20b.jpg"/>
				<updated>2008-04-05T18:40:28Z</updated>
		
		<summary type="html">&lt;p&gt;Brennej:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Brennej</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Identity20.jpg</id>
		<title>File:Identity20.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Identity20.jpg"/>
				<updated>2008-04-05T18:40:10Z</updated>
		
		<summary type="html">&lt;p&gt;Brennej:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Brennej</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Identity10.jpg</id>
		<title>File:Identity10.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Identity10.jpg"/>
				<updated>2008-04-05T18:35:53Z</updated>
		
		<summary type="html">&lt;p&gt;Brennej:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Brennej</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Identity1.0.jpg</id>
		<title>File:Identity1.0.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Identity1.0.jpg"/>
				<updated>2008-04-05T18:34:27Z</updated>
		
		<summary type="html">&lt;p&gt;Brennej:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Brennej</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Site_centric.jpg</id>
		<title>File:Site centric.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Site_centric.jpg"/>
				<updated>2008-04-05T18:31:13Z</updated>
		
		<summary type="html">&lt;p&gt;Brennej:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Brennej</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:User_centric.jpg</id>
		<title>File:User centric.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:User_centric.jpg"/>
				<updated>2008-04-05T18:24:11Z</updated>
		
		<summary type="html">&lt;p&gt;Brennej:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Brennej</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Site_centric2.jpg</id>
		<title>File:Site centric2.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Site_centric2.jpg"/>
				<updated>2008-04-05T18:19:10Z</updated>
		
		<summary type="html">&lt;p&gt;Brennej:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Brennej</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Identity_2.0</id>
		<title>Identity 2.0</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Identity_2.0"/>
				<updated>2008-04-05T18:18:00Z</updated>
		
		<summary type="html">&lt;p&gt;Brennej:&amp;#32;New page: = Identity 2.0 = '''Identity 2.0''' is the forthcoming revolution in online identity verification.  The major shift from Identity 1.0 is the move from site-centric identity silos (figures ...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Identity 2.0 =&lt;br /&gt;
'''Identity 2.0''' is the forthcoming revolution in online identity verification.&lt;br /&gt;
&lt;br /&gt;
The major shift from Identity 1.0 is the move from site-centric identity silos (figures 1 and 2) to an open concept user-centric structure, where the user can move their identity from any site to any site (figure 3).&lt;br /&gt;
[[Image:Site_centric.gif|thumb|300px|none|Figure 1: Identity 1.0 site-centric]]&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Identity 1.0==&lt;br /&gt;
sdf&lt;br /&gt;
==Identity 2.0==&lt;br /&gt;
sdf&lt;br /&gt;
==Future==&lt;br /&gt;
sdfsdf&lt;br /&gt;
==Links==&lt;br /&gt;
sdffsd&lt;/div&gt;</summary>
		<author><name>Brennej</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Site_centric.gif</id>
		<title>File:Site centric.gif</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Site_centric.gif"/>
				<updated>2008-04-05T17:51:25Z</updated>
		
		<summary type="html">&lt;p&gt;Brennej:&amp;#32;Identity 1.0 site-centric&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Identity 1.0 site-centric&lt;/div&gt;</summary>
		<author><name>Brennej</name></author>	</entry>

	</feed>