Home > Research > Publications & Outputs > SuperIdentity
View graph of relations

SuperIdentity: fusion of identity across real and cyber domains

Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

Published

Standard

SuperIdentity: fusion of identity across real and cyber domains. / Black, Sue; Creese, Sadie (Editor); Guest, Richard et al.
2012. Paper presented at ID360 - The Global Forum on Identity, Austin, Texas, United States.

Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

Harvard

Black, S, Creese, S (ed.), Guest, R, Pike, B (ed.), Saxby, S (ed.), Stanton Fraser, D (ed.), Stevenage, SV & Whitty, MT (ed.) 2012, 'SuperIdentity: fusion of identity across real and cyber domains', Paper presented at ID360 - The Global Forum on Identity, Austin, Texas, United States, 23/04/12 - 24/04/12.

APA

Black, S., Creese, S. (Ed.), Guest, R., Pike, B. (Ed.), Saxby, S. (Ed.), Stanton Fraser, D. (Ed.), Stevenage, S. V., & Whitty, M. T. (Ed.) (2012). SuperIdentity: fusion of identity across real and cyber domains. Paper presented at ID360 - The Global Forum on Identity, Austin, Texas, United States.

Vancouver

Black S, Creese S, (ed.), Guest R, Pike B, (ed.), Saxby S, (ed.), Stanton Fraser D, (ed.) et al.. SuperIdentity: fusion of identity across real and cyber domains. 2012. Paper presented at ID360 - The Global Forum on Identity, Austin, Texas, United States.

Author

Black, Sue ; Creese, Sadie (Editor) ; Guest, Richard et al. / SuperIdentity : fusion of identity across real and cyber domains. Paper presented at ID360 - The Global Forum on Identity, Austin, Texas, United States.

Bibtex

@conference{3d95bbd2fb4a4dde8540fb59729bace2,
title = "SuperIdentity: fusion of identity across real and cyber domains",
abstract = "Under both benign and malign circumstances, people now manage a spectrum of identities across both real-world and cyber domains. Our belief, however, is that all these instances ultimately track back for an individual to reflect a single {\textquoteleft}SuperIdentity{\textquoteright}. This paper outlines the assumptions underpinning the SuperIdentity Project, describing the innovative use of data fusion to incorporate novel real-world and cyber cues into a rich framework appropriate for modern identity. The proposed combinatorial model will support a robust identification or authentication decision, with confidence indexed both by the level of trust in data provenance, and the diagnosticity of the identity factors being used. Additionally, the exploration of correlations between factors may underpin the more intelligent use of identity information so that known information may be used to predict previously hidden information. With modern living supporting the {\textquoteleft}distribution of identity{\textquoteright} across real and cyber domains, and with criminal elements operating in increasingly sophisticated ways in the hinterland between the two, this approach is suggested as a way forwards, and is discussed in terms of its impact on privacy, security, and the detection of threat",
keywords = "Identification, Verification, Biometrics, Cyber-identity",
author = "Sue Black and Sadie Creese and Richard Guest and Bill Pike and Steve Saxby and {Stanton Fraser}, Danae and Stevenage, {Sarah V.} and Whitty, {Monica T.}",
year = "2012",
language = "English",
note = "ID360 - The Global Forum on Identity, ID360 2012 ; Conference date: 23-04-2012 Through 24-04-2012",

}

RIS

TY - CONF

T1 - SuperIdentity

T2 - ID360 - The Global Forum on Identity

AU - Black, Sue

AU - Guest, Richard

AU - Stevenage, Sarah V.

A2 - Creese, Sadie

A2 - Pike, Bill

A2 - Saxby, Steve

A2 - Stanton Fraser, Danae

A2 - Whitty, Monica T.

PY - 2012

Y1 - 2012

N2 - Under both benign and malign circumstances, people now manage a spectrum of identities across both real-world and cyber domains. Our belief, however, is that all these instances ultimately track back for an individual to reflect a single ‘SuperIdentity’. This paper outlines the assumptions underpinning the SuperIdentity Project, describing the innovative use of data fusion to incorporate novel real-world and cyber cues into a rich framework appropriate for modern identity. The proposed combinatorial model will support a robust identification or authentication decision, with confidence indexed both by the level of trust in data provenance, and the diagnosticity of the identity factors being used. Additionally, the exploration of correlations between factors may underpin the more intelligent use of identity information so that known information may be used to predict previously hidden information. With modern living supporting the ‘distribution of identity’ across real and cyber domains, and with criminal elements operating in increasingly sophisticated ways in the hinterland between the two, this approach is suggested as a way forwards, and is discussed in terms of its impact on privacy, security, and the detection of threat

AB - Under both benign and malign circumstances, people now manage a spectrum of identities across both real-world and cyber domains. Our belief, however, is that all these instances ultimately track back for an individual to reflect a single ‘SuperIdentity’. This paper outlines the assumptions underpinning the SuperIdentity Project, describing the innovative use of data fusion to incorporate novel real-world and cyber cues into a rich framework appropriate for modern identity. The proposed combinatorial model will support a robust identification or authentication decision, with confidence indexed both by the level of trust in data provenance, and the diagnosticity of the identity factors being used. Additionally, the exploration of correlations between factors may underpin the more intelligent use of identity information so that known information may be used to predict previously hidden information. With modern living supporting the ‘distribution of identity’ across real and cyber domains, and with criminal elements operating in increasingly sophisticated ways in the hinterland between the two, this approach is suggested as a way forwards, and is discussed in terms of its impact on privacy, security, and the detection of threat

KW - Identification

KW - Verification

KW - Biometrics

KW - Cyber-identity

M3 - Conference paper

Y2 - 23 April 2012 through 24 April 2012

ER -