SlideShare a Scribd company logo
1 of 26
NSTIC ID Ecosystem
A Conceptual Model
Andrew Hughes
September 2013
AndrewHughes3000@gmail.com - September 2013 1
This slide deck was created September 2013 by Andrew Hughes – please contact for more information or
comments. This deck builds upon material in the presentation deck originally presented to IDESG
Committees at the July 2013 IDESG Plenary meeting at MIT.
AndrewHughes3000@gmail.com
www.idimmusings.com
This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of
this license, visit http://creativecommons.org/licenses/by/3.0/ or send a letter to Creative Commons, 444
Castro Street, Suite 900, Mountain View, California, 94041, USA.
AndrewHughes3000@gmail.com - September
2013
2
Introduction
• The IDESG is seeking a way to represent the ID
Ecosystem and ID Ecosystem Framework
concepts
• Currently, there is no simple image that captures
what the ID Ecosystem is as envisioned in the
NSTIC Strategy document
• This deck is an attempt to build a conceptual
model that shows the nature of the ID Ecosystem
and its essential aspects
AndrewHughes3000@gmail.com - September
2013
3
Objectives
• To describe the ID Ecosystem from the point of
view of an “Online Community”, its Transactions
and the role of the IDESG
• To demonstrate a conceptual model of the ID
Ecosystem that can be used as a tool to discover
potential ecosystem participants and to explain
what it means to be part of the ecosystem
AndrewHughes3000@gmail.com - September
2013
4
Design Considerations
• The transaction between Online Community Members is the
central concern: all else exists to support the transaction
• Must embody the NSTIC Guiding Principles
• ID Solutions will be: privacy-enhancing and voluntary; secure
and resilient; interoperable; cost-effective and easy to use
• The conceptual model must be able to explain all possible
ID Ecosystem candidate members
• The conceptual model must predict flexibility in design of the
ID Ecosystem
• Start the conceptual model at the highest level of abstraction
and slowly increase the specificity
AndrewHughes3000@gmail.com - September
2013
5
NSTIC Vision*
Individuals and organizations
utilize secure, efficient, easy-to-use and
interoperable identity solutions
to access online services
in a manner that
promotes confidence, privacy, choice, and
innovation.
AndrewHughes3000@gmail.com - September
2013
6
*Source: The NSTIC Strategy
Document
The ID Ecosystem*
will consist of
different online communities
that use
interoperable
technology, processes, and policies
AndrewHughes3000@gmail.com - September
2013
7
*Source: The NSTIC Strategy
Document
Trust Framework*
• developed by a community
• defines the rights and responsibilities of that
community‟s participants
• specifies the policies and standards specific to the
community
• defines the community-specific processes and
procedures that provide assurance
• considers the level of risk associated with the
transaction types of its participants
AndrewHughes3000@gmail.com - September
2013
8
*Source: The NSTIC Strategy
Document
The Central Concern
• The relationship and transactions that drive most (not all!) of
the requirements and use cases:
The transaction between the
e-Service Provider
and their Customer
• The e-Service Provider tells the Customer the Terms of
Service for the transaction
• The Customer fulfills the Terms of Service in order to receive
service
• All else exists to support, facilitate, and secure these
interactions!
AndrewHughes3000@gmail.com - September
2013
9
The View From The Moon
AndrewHughes3000@gmail.com - September
2013
10
e-Service
Provider
e-Service
Consumer
Transaction
Terms of Service
Fulfillment of Terms
The Online
Community
Where‟s the IdP?
• For that matter, where‟s the CSP, CA, IDPV, RP?
• This conceptual model does not need them at the
highest levels of abstraction
• Wait for it – it‟s coming up in a few slides
AndrewHughes3000@gmail.com - September
2013
11
The View From Voyager 1
AndrewHughes3000@gmail.com - September
2013
12
THE NSTIC ID ECOSYSTEM!
ID Ecosystem
Framework*
the overarching set of
interoperability standards,
risk models,
privacy and liability policies,
requirements, and
accountability mechanisms
that structure the Identity Ecosystem
AndrewHughes3000@gmail.com - September
2013
13
*Source: The NSTIC Strategy
Document
The View From The 757
• The next three slides:
• The Online Community
• “Terms of Service”
• Fulfillment of Terms
• Keep in mind:
• The elements listed on the next few slides, constrained by
and driven by IDESG designated interoperability
standards, risk models, privacy and liability policies,
requirements, and accountability mechanisms
ARE the ID Ecosystem Framework
AndrewHughes3000@gmail.com - September
2013
14
The “Online Community”
AndrewHughes3000@gmail.com - September
2013
15
The Community
• Shared values, beliefs,
principles
• Common goals and objectives
• Has „tools‟ for joining
• Has „tools‟ for locating
• Could be mandated by law
The Transaction
• A particular set of commercial,
social, „social contract‟,
information exchanges that
exist for the community, in
support of their common goals
Business
• Shared need to
perform transactions
in the context of the
community
Legal
• Trust Framework
agreements
• Commercial
contracts
• Legal Framework
Technical
• Protocol suites &
capability
• Network Connectivity
• Shared Standards
The Online Community
“Terms of Service”
AndrewHughes3000@gmail.com - September
2013
16
Business
• Payment / Money
• Information
• Eligibility
Legal
• Contract / Agreement
• Terms and Conditions
• Lawfulness
Technical
• Protocols & Standards
• Crypto capability
• Electronic Tokens &
Credentials
• Other technical capabilities
IdP, IDPV, Credentials,
Tokens
• Imagine some likely Terms of Service:
• Give me these attributes, cryptographically signed by an
Attribute Provider I recognize, so I can verify your eligibility
• Prove that you have authenticated successfully with an
IdP I have a trust relationship with
• Prove that you did the authentication with a Level 4
Credential
• That’s where they are – the „typical‟ federation entities
are support mechanisms to enable Terms that
leverage „outsourced/externalized/federated‟ services
AndrewHughes3000@gmail.com - September
2013
17
Fulfillment of Terms
AndrewHughes3000@gmail.com - September
2013
18
Business
• Payment / Money
• Information
• Eligibility Proof
Legal
• Contract / Agreement
• Terms and Conditions
• Lawfulness
Technical
• Protocols & Standards
• Crypto capability
• Electronic Tokens &
Credentials
• Other technical capabilities
An Online Community
AndrewHughes3000@gmail.com - September
2013
19
e-Service
Provider
e-Service
Consumer
Transaction
Terms of Service
Fulfillment of Terms
The Online
Community
A Question of Trust
• Question:
Who should the Online Community trust?
• Answer:
Community participants accredited by an Accreditation
Authority
• Question:
Whose Trust Framework does the Accreditation
Authority assess against?
• Answer:
The Community‟s Trust Framework, of course
AndrewHughes3000@gmail.com - September
2013
20
Accreditation Authority*
assesses and validates
identity providers,
attribute providers,
relying parties,
and identity media,
ensuring that they all adhere
to an agreed-upon trust framework
(the community’s trust framework)
AndrewHughes3000@gmail.com - September
2013
21
*Source: The NSTIC Strategy
Document
Trust Framework*, redux
• developed by a community
• defines the rights and responsibilities of that
community‟s participants
• specifies the policies and standards specific to the
community
• defines the community-specific processes and
procedures that provide assurance
• considers the level of risk associated with the
transaction types of its participants
AndrewHughes3000@gmail.com - September
2013
22
*Source: The NSTIC Strategy
Document
Who Do You Trust?
• IDESG, via the Accreditation Authority:
• Assesses the Online Community and its participants
against that Online Community‟s Trust Framework
(Operating Rules)
• Confers Trustmarks to signal to participants that
Assessments and Accreditation has been done to a
known standard
AndrewHughes3000@gmail.com - September
2013
23
Interoperate Me
• Interoperability within an Online Community is a
defining feature of Online Communities
• IDESG could foster technology, process and
policy interoperability between Online
Communities by defining common Accreditation
Patterns for the inter-Community interactions
• IDESG, via the Accreditation Authority, could
assess and issue Trustmarks for the inter-
Community interactions
AndrewHughes3000@gmail.com - September
2013
24
Now What?
• Starting with the conceptual model rationale in this
presentation, to build the ID Ecosystem:
• IDESG must search for and find the Online Communities
that resemble and are compatible with the conceptual
model of the ID Ecosystem
• Analyze the Online Community participants according to
the parameters described in the conceptual model
• That is: identify the transaction types, terms of service,
mechanisms to fulfill terms, the archetypal e-Service
Providers and e-Service Consumers
• Document the ID Ecosystem Framework in concert with
the discovery and analysis activities
AndrewHughes3000@gmail.com - September
2013
25
These Slides
• These slides attempt to capture the concept and
pattern of the ID Ecosystem and ID Ecosystem
Framework as set out in the NSTIC Strategy
document
• Further work is needed to refine and expand on
the entities described in this deck, in order to
achieve a more directly pragmatic level of detail
AndrewHughes3000@gmail.com - September
2013
26

More Related Content

What's hot

The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondAhmed Banafa
 
Delloite custodian whitepaper
Delloite custodian whitepaperDelloite custodian whitepaper
Delloite custodian whitepaperIT Strategy Group
 
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-publicCyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-publicSecunoid Systems Inc
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainAhmed Banafa
 
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloIntroducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloSSIMeetup
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceEryk Budi Pratama
 
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...Chad Lawler
 
25 7351 9003-1-ed secure cloud (edit a)
25 7351 9003-1-ed secure cloud (edit a)25 7351 9003-1-ed secure cloud (edit a)
25 7351 9003-1-ed secure cloud (edit a)IAESIJEECS
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveSSIMeetup
 
Introduction to Blockchain Governance Models
Introduction to Blockchain Governance ModelsIntroduction to Blockchain Governance Models
Introduction to Blockchain Governance ModelsGokul Alex
 
Blockchain security a different perspective
Blockchain security a different perspectiveBlockchain security a different perspective
Blockchain security a different perspectiveSecunoid Systems Inc
 
Blockchain in 2018 : Beyond the Hype
Blockchain in 2018 : Beyond the HypeBlockchain in 2018 : Beyond the Hype
Blockchain in 2018 : Beyond the HypeAhmed Banafa
 
NACM eNews Article dated May 19 2016
NACM eNews Article dated May 19 2016NACM eNews Article dated May 19 2016
NACM eNews Article dated May 19 2016Sam Smith
 
IRJET- Blockchain based Fake Product Identification in Supply Chain
IRJET- Blockchain based Fake Product Identification in Supply ChainIRJET- Blockchain based Fake Product Identification in Supply Chain
IRJET- Blockchain based Fake Product Identification in Supply ChainIRJET Journal
 
A Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainA Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainAltoros
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...Ahmed Banafa
 
Legal Education in the Blockchain Revolution de Mark Fenwick,* Wulf A. Kaal**...
Legal Education in the Blockchain Revolution de Mark Fenwick,* Wulf A. Kaal**...Legal Education in the Blockchain Revolution de Mark Fenwick,* Wulf A. Kaal**...
Legal Education in the Blockchain Revolution de Mark Fenwick,* Wulf A. Kaal**...eraser Juan José Calderón
 
Enterprise Blockchain Application Development using Azure Blockchain Service
Enterprise Blockchain Application Development using Azure Blockchain ServiceEnterprise Blockchain Application Development using Azure Blockchain Service
Enterprise Blockchain Application Development using Azure Blockchain ServiceJuarez Junior
 

What's hot (20)

The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and Beyond
 
Delloite custodian whitepaper
Delloite custodian whitepaperDelloite custodian whitepaper
Delloite custodian whitepaper
 
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-publicCyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : Blockchain
 
Nist.ir.8202
Nist.ir.8202Nist.ir.8202
Nist.ir.8202
 
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloIntroducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & Assurance
 
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
 
Digital identity
Digital identityDigital identity
Digital identity
 
25 7351 9003-1-ed secure cloud (edit a)
25 7351 9003-1-ed secure cloud (edit a)25 7351 9003-1-ed secure cloud (edit a)
25 7351 9003-1-ed secure cloud (edit a)
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep dive
 
Introduction to Blockchain Governance Models
Introduction to Blockchain Governance ModelsIntroduction to Blockchain Governance Models
Introduction to Blockchain Governance Models
 
Blockchain security a different perspective
Blockchain security a different perspectiveBlockchain security a different perspective
Blockchain security a different perspective
 
Blockchain in 2018 : Beyond the Hype
Blockchain in 2018 : Beyond the HypeBlockchain in 2018 : Beyond the Hype
Blockchain in 2018 : Beyond the Hype
 
NACM eNews Article dated May 19 2016
NACM eNews Article dated May 19 2016NACM eNews Article dated May 19 2016
NACM eNews Article dated May 19 2016
 
IRJET- Blockchain based Fake Product Identification in Supply Chain
IRJET- Blockchain based Fake Product Identification in Supply ChainIRJET- Blockchain based Fake Product Identification in Supply Chain
IRJET- Blockchain based Fake Product Identification in Supply Chain
 
A Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainA Secure Model of IoT Using Blockchain
A Secure Model of IoT Using Blockchain
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
 
Legal Education in the Blockchain Revolution de Mark Fenwick,* Wulf A. Kaal**...
Legal Education in the Blockchain Revolution de Mark Fenwick,* Wulf A. Kaal**...Legal Education in the Blockchain Revolution de Mark Fenwick,* Wulf A. Kaal**...
Legal Education in the Blockchain Revolution de Mark Fenwick,* Wulf A. Kaal**...
 
Enterprise Blockchain Application Development using Azure Blockchain Service
Enterprise Blockchain Application Development using Azure Blockchain ServiceEnterprise Blockchain Application Development using Azure Blockchain Service
Enterprise Blockchain Application Development using Azure Blockchain Service
 

Viewers also liked

Evaluation question 4
Evaluation question 4Evaluation question 4
Evaluation question 4Harry Cooke
 
product disney
product disneyproduct disney
product disneyFuji Yoko
 
portofolio 2015 bags & Acc
portofolio 2015 bags & Accportofolio 2015 bags & Acc
portofolio 2015 bags & AccFuji Yoko
 
HienVo_Mobile Testing_v.1.2
HienVo_Mobile Testing_v.1.2HienVo_Mobile Testing_v.1.2
HienVo_Mobile Testing_v.1.2Hien Vo
 
Reference Texts
Reference TextsReference Texts
Reference TextsKidzmet
 
Kristina Petersen, Hvidovre Hospital - Patientindragelse I Praksis
Kristina Petersen, Hvidovre Hospital  - Patientindragelse I PraksisKristina Petersen, Hvidovre Hospital  - Patientindragelse I Praksis
Kristina Petersen, Hvidovre Hospital - Patientindragelse I Praksiskoradk
 
Ppt skripsi (Hurairoh, Agung, Filma)
Ppt skripsi (Hurairoh, Agung, Filma)Ppt skripsi (Hurairoh, Agung, Filma)
Ppt skripsi (Hurairoh, Agung, Filma)Hurairoh Rhomodon
 
Comercio Electronico
Comercio Electronico Comercio Electronico
Comercio Electronico Nancy romero
 
NSTIC IDESG ID Ecosystem Conceptual Model v02
NSTIC IDESG ID Ecosystem Conceptual Model v02NSTIC IDESG ID Ecosystem Conceptual Model v02
NSTIC IDESG ID Ecosystem Conceptual Model v02Andrew Hughes
 
Presentacion ensayo
Presentacion ensayoPresentacion ensayo
Presentacion ensayomilnz
 

Viewers also liked (15)

Evaluation question 4
Evaluation question 4Evaluation question 4
Evaluation question 4
 
product disney
product disneyproduct disney
product disney
 
portofolio 2015 bags & Acc
portofolio 2015 bags & Accportofolio 2015 bags & Acc
portofolio 2015 bags & Acc
 
Aulas virtuales
Aulas virtualesAulas virtuales
Aulas virtuales
 
0944388579HUT BE PHOT
0944388579HUT BE PHOT0944388579HUT BE PHOT
0944388579HUT BE PHOT
 
HienVo_Mobile Testing_v.1.2
HienVo_Mobile Testing_v.1.2HienVo_Mobile Testing_v.1.2
HienVo_Mobile Testing_v.1.2
 
LEE FW 15
LEE FW 15LEE FW 15
LEE FW 15
 
Reference Texts
Reference TextsReference Texts
Reference Texts
 
Microsft matematika menggambar grafik fungsi
Microsft matematika menggambar grafik fungsiMicrosft matematika menggambar grafik fungsi
Microsft matematika menggambar grafik fungsi
 
Kristina Petersen, Hvidovre Hospital - Patientindragelse I Praksis
Kristina Petersen, Hvidovre Hospital  - Patientindragelse I PraksisKristina Petersen, Hvidovre Hospital  - Patientindragelse I Praksis
Kristina Petersen, Hvidovre Hospital - Patientindragelse I Praksis
 
Ppt skripsi (Hurairoh, Agung, Filma)
Ppt skripsi (Hurairoh, Agung, Filma)Ppt skripsi (Hurairoh, Agung, Filma)
Ppt skripsi (Hurairoh, Agung, Filma)
 
Comercio Electronico
Comercio Electronico Comercio Electronico
Comercio Electronico
 
NSTIC IDESG ID Ecosystem Conceptual Model v02
NSTIC IDESG ID Ecosystem Conceptual Model v02NSTIC IDESG ID Ecosystem Conceptual Model v02
NSTIC IDESG ID Ecosystem Conceptual Model v02
 
Mind map Barisan dan Deret
Mind map Barisan dan DeretMind map Barisan dan Deret
Mind map Barisan dan Deret
 
Presentacion ensayo
Presentacion ensayoPresentacion ensayo
Presentacion ensayo
 

Similar to A Conceptual Model for the NSTIC ID Ecosystem - Discussion Draft

Respect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud LoginRespect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud Logindrummondreed
 
Age Verification: Reaching a Tipping Point
Age Verification: Reaching a Tipping PointAge Verification: Reaching a Tipping Point
Age Verification: Reaching a Tipping PointDr Rachel O'Connell
 
Reputation based model for decision making in the digital age
Reputation based model for decision making in the digital ageReputation based model for decision making in the digital age
Reputation based model for decision making in the digital ageTogar Simatupang
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingPhil Agcaoili
 
Federated Identity - DLNE 11th December
Federated Identity - DLNE 11th DecemberFederated Identity - DLNE 11th December
Federated Identity - DLNE 11th DecemberMyDigitalBiz-DLNE
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems Maganathin Veeraragaloo
 
Getting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
Getting Started With Self-Sovereign Identity (SSI) | Evernym WebinarGetting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
Getting Started With Self-Sovereign Identity (SSI) | Evernym WebinarEvernym
 
Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Peter Bihr
 
Audit and outsourcing: their role in creating interoperable repository infras...
Audit and outsourcing: their role in creating interoperable repository infras...Audit and outsourcing: their role in creating interoperable repository infras...
Audit and outsourcing: their role in creating interoperable repository infras...Kevin Ashley
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lrFuture Agenda
 
CSA Introduction 2013 David Ross
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David RossGraeme Wood
 
Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Catapult
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...MicheleNati
 
Trust and identity in the Géant project - Networkshop44
Trust and identity in the Géant project - Networkshop44Trust and identity in the Géant project - Networkshop44
Trust and identity in the Géant project - Networkshop44Jisc
 
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Cloud Security Alliance Lviv Chapter
 
BYOD: Beating IT’s Kobayashi Maru
BYOD: Beating IT’s Kobayashi MaruBYOD: Beating IT’s Kobayashi Maru
BYOD: Beating IT’s Kobayashi MaruMichele Chubirka
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueDeloitte United States
 

Similar to A Conceptual Model for the NSTIC ID Ecosystem - Discussion Draft (20)

Respect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud LoginRespect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud Login
 
Age Verification: Reaching a Tipping Point
Age Verification: Reaching a Tipping PointAge Verification: Reaching a Tipping Point
Age Verification: Reaching a Tipping Point
 
Reputation based model for decision making in the digital age
Reputation based model for decision making in the digital ageReputation based model for decision making in the digital age
Reputation based model for decision making in the digital age
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter Meeting
 
Federated Identity - DLNE 11th December
Federated Identity - DLNE 11th DecemberFederated Identity - DLNE 11th December
Federated Identity - DLNE 11th December
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems
 
Getting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
Getting Started With Self-Sovereign Identity (SSI) | Evernym WebinarGetting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
Getting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
 
Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)
 
Audit and outsourcing: their role in creating interoperable repository infras...
Audit and outsourcing: their role in creating interoperable repository infras...Audit and outsourcing: their role in creating interoperable repository infras...
Audit and outsourcing: their role in creating interoperable repository infras...
 
Sharing best practices for success
Sharing best practices for successSharing best practices for success
Sharing best practices for success
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lr
 
CSA Introduction 2013 David Ross
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David Ross
 
Introduction to CSA Australia 2013 by David Ross
Introduction to CSA Australia 2013 by David RossIntroduction to CSA Australia 2013 by David Ross
Introduction to CSA Australia 2013 by David Ross
 
Compliance in Public Cloud & CSA Framework
Compliance in Public Cloud & CSA FrameworkCompliance in Public Cloud & CSA Framework
Compliance in Public Cloud & CSA Framework
 
Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
 
Trust and identity in the Géant project - Networkshop44
Trust and identity in the Géant project - Networkshop44Trust and identity in the Géant project - Networkshop44
Trust and identity in the Géant project - Networkshop44
 
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
 
BYOD: Beating IT’s Kobayashi Maru
BYOD: Beating IT’s Kobayashi MaruBYOD: Beating IT’s Kobayashi Maru
BYOD: Beating IT’s Kobayashi Maru
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

A Conceptual Model for the NSTIC ID Ecosystem - Discussion Draft

  • 1. NSTIC ID Ecosystem A Conceptual Model Andrew Hughes September 2013 AndrewHughes3000@gmail.com - September 2013 1
  • 2. This slide deck was created September 2013 by Andrew Hughes – please contact for more information or comments. This deck builds upon material in the presentation deck originally presented to IDESG Committees at the July 2013 IDESG Plenary meeting at MIT. AndrewHughes3000@gmail.com www.idimmusings.com This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0/ or send a letter to Creative Commons, 444 Castro Street, Suite 900, Mountain View, California, 94041, USA. AndrewHughes3000@gmail.com - September 2013 2
  • 3. Introduction • The IDESG is seeking a way to represent the ID Ecosystem and ID Ecosystem Framework concepts • Currently, there is no simple image that captures what the ID Ecosystem is as envisioned in the NSTIC Strategy document • This deck is an attempt to build a conceptual model that shows the nature of the ID Ecosystem and its essential aspects AndrewHughes3000@gmail.com - September 2013 3
  • 4. Objectives • To describe the ID Ecosystem from the point of view of an “Online Community”, its Transactions and the role of the IDESG • To demonstrate a conceptual model of the ID Ecosystem that can be used as a tool to discover potential ecosystem participants and to explain what it means to be part of the ecosystem AndrewHughes3000@gmail.com - September 2013 4
  • 5. Design Considerations • The transaction between Online Community Members is the central concern: all else exists to support the transaction • Must embody the NSTIC Guiding Principles • ID Solutions will be: privacy-enhancing and voluntary; secure and resilient; interoperable; cost-effective and easy to use • The conceptual model must be able to explain all possible ID Ecosystem candidate members • The conceptual model must predict flexibility in design of the ID Ecosystem • Start the conceptual model at the highest level of abstraction and slowly increase the specificity AndrewHughes3000@gmail.com - September 2013 5
  • 6. NSTIC Vision* Individuals and organizations utilize secure, efficient, easy-to-use and interoperable identity solutions to access online services in a manner that promotes confidence, privacy, choice, and innovation. AndrewHughes3000@gmail.com - September 2013 6 *Source: The NSTIC Strategy Document
  • 7. The ID Ecosystem* will consist of different online communities that use interoperable technology, processes, and policies AndrewHughes3000@gmail.com - September 2013 7 *Source: The NSTIC Strategy Document
  • 8. Trust Framework* • developed by a community • defines the rights and responsibilities of that community‟s participants • specifies the policies and standards specific to the community • defines the community-specific processes and procedures that provide assurance • considers the level of risk associated with the transaction types of its participants AndrewHughes3000@gmail.com - September 2013 8 *Source: The NSTIC Strategy Document
  • 9. The Central Concern • The relationship and transactions that drive most (not all!) of the requirements and use cases: The transaction between the e-Service Provider and their Customer • The e-Service Provider tells the Customer the Terms of Service for the transaction • The Customer fulfills the Terms of Service in order to receive service • All else exists to support, facilitate, and secure these interactions! AndrewHughes3000@gmail.com - September 2013 9
  • 10. The View From The Moon AndrewHughes3000@gmail.com - September 2013 10 e-Service Provider e-Service Consumer Transaction Terms of Service Fulfillment of Terms The Online Community
  • 11. Where‟s the IdP? • For that matter, where‟s the CSP, CA, IDPV, RP? • This conceptual model does not need them at the highest levels of abstraction • Wait for it – it‟s coming up in a few slides AndrewHughes3000@gmail.com - September 2013 11
  • 12. The View From Voyager 1 AndrewHughes3000@gmail.com - September 2013 12 THE NSTIC ID ECOSYSTEM!
  • 13. ID Ecosystem Framework* the overarching set of interoperability standards, risk models, privacy and liability policies, requirements, and accountability mechanisms that structure the Identity Ecosystem AndrewHughes3000@gmail.com - September 2013 13 *Source: The NSTIC Strategy Document
  • 14. The View From The 757 • The next three slides: • The Online Community • “Terms of Service” • Fulfillment of Terms • Keep in mind: • The elements listed on the next few slides, constrained by and driven by IDESG designated interoperability standards, risk models, privacy and liability policies, requirements, and accountability mechanisms ARE the ID Ecosystem Framework AndrewHughes3000@gmail.com - September 2013 14
  • 15. The “Online Community” AndrewHughes3000@gmail.com - September 2013 15 The Community • Shared values, beliefs, principles • Common goals and objectives • Has „tools‟ for joining • Has „tools‟ for locating • Could be mandated by law The Transaction • A particular set of commercial, social, „social contract‟, information exchanges that exist for the community, in support of their common goals Business • Shared need to perform transactions in the context of the community Legal • Trust Framework agreements • Commercial contracts • Legal Framework Technical • Protocol suites & capability • Network Connectivity • Shared Standards The Online Community
  • 16. “Terms of Service” AndrewHughes3000@gmail.com - September 2013 16 Business • Payment / Money • Information • Eligibility Legal • Contract / Agreement • Terms and Conditions • Lawfulness Technical • Protocols & Standards • Crypto capability • Electronic Tokens & Credentials • Other technical capabilities
  • 17. IdP, IDPV, Credentials, Tokens • Imagine some likely Terms of Service: • Give me these attributes, cryptographically signed by an Attribute Provider I recognize, so I can verify your eligibility • Prove that you have authenticated successfully with an IdP I have a trust relationship with • Prove that you did the authentication with a Level 4 Credential • That’s where they are – the „typical‟ federation entities are support mechanisms to enable Terms that leverage „outsourced/externalized/federated‟ services AndrewHughes3000@gmail.com - September 2013 17
  • 18. Fulfillment of Terms AndrewHughes3000@gmail.com - September 2013 18 Business • Payment / Money • Information • Eligibility Proof Legal • Contract / Agreement • Terms and Conditions • Lawfulness Technical • Protocols & Standards • Crypto capability • Electronic Tokens & Credentials • Other technical capabilities
  • 19. An Online Community AndrewHughes3000@gmail.com - September 2013 19 e-Service Provider e-Service Consumer Transaction Terms of Service Fulfillment of Terms The Online Community
  • 20. A Question of Trust • Question: Who should the Online Community trust? • Answer: Community participants accredited by an Accreditation Authority • Question: Whose Trust Framework does the Accreditation Authority assess against? • Answer: The Community‟s Trust Framework, of course AndrewHughes3000@gmail.com - September 2013 20
  • 21. Accreditation Authority* assesses and validates identity providers, attribute providers, relying parties, and identity media, ensuring that they all adhere to an agreed-upon trust framework (the community’s trust framework) AndrewHughes3000@gmail.com - September 2013 21 *Source: The NSTIC Strategy Document
  • 22. Trust Framework*, redux • developed by a community • defines the rights and responsibilities of that community‟s participants • specifies the policies and standards specific to the community • defines the community-specific processes and procedures that provide assurance • considers the level of risk associated with the transaction types of its participants AndrewHughes3000@gmail.com - September 2013 22 *Source: The NSTIC Strategy Document
  • 23. Who Do You Trust? • IDESG, via the Accreditation Authority: • Assesses the Online Community and its participants against that Online Community‟s Trust Framework (Operating Rules) • Confers Trustmarks to signal to participants that Assessments and Accreditation has been done to a known standard AndrewHughes3000@gmail.com - September 2013 23
  • 24. Interoperate Me • Interoperability within an Online Community is a defining feature of Online Communities • IDESG could foster technology, process and policy interoperability between Online Communities by defining common Accreditation Patterns for the inter-Community interactions • IDESG, via the Accreditation Authority, could assess and issue Trustmarks for the inter- Community interactions AndrewHughes3000@gmail.com - September 2013 24
  • 25. Now What? • Starting with the conceptual model rationale in this presentation, to build the ID Ecosystem: • IDESG must search for and find the Online Communities that resemble and are compatible with the conceptual model of the ID Ecosystem • Analyze the Online Community participants according to the parameters described in the conceptual model • That is: identify the transaction types, terms of service, mechanisms to fulfill terms, the archetypal e-Service Providers and e-Service Consumers • Document the ID Ecosystem Framework in concert with the discovery and analysis activities AndrewHughes3000@gmail.com - September 2013 25
  • 26. These Slides • These slides attempt to capture the concept and pattern of the ID Ecosystem and ID Ecosystem Framework as set out in the NSTIC Strategy document • Further work is needed to refine and expand on the entities described in this deck, in order to achieve a more directly pragmatic level of detail AndrewHughes3000@gmail.com - September 2013 26