Posts with keyword: trust

                    Fidelity, Provenance, and Trust

                    In this post, I look at the words we use to describe verifiable credential exchange with an eye to being more specific about the part different components of the SSI stack play in providing trustworthy data exchange.
                    Continue reading...

                    Building Your Business on Sovrin: Domain-Specific Trust Frameworks

                    A domain-specific trust framework is a collection of policies, legal agreements and technologies that provides the context for claims in a given domain. Sovrin Foundation provides a structure and supporting systems for groups defining trust frameworks. This post describes how domain-specific trust frameworks function.
                    Continue reading...

                    Identity, Sovrin, and the Internet of Things

                    Building the Internet of Things securely requires that we look to non-hierarchical models for managing trust. Sovrin provides a Web of Trust model for securing the Internet of Things that increases security and availability while giving device owners more control.
                    Continue reading...

                    Sovrin Status: Provisional Trust Framework

                    The Sovrin Trust Framework is nothing less that the constitution of the Sovrin Network. The Provisional Trust Framework was recently completed and approved. This post gives details about what the Sovrin Trust Framework is and why it's so important.
                    Continue reading...

                    Sovrin Web of Trust

                    Sovrin uses a heterarchical, decentralized Web of Trust model to build trust in identifiers and give people clues about what and who to trust.
                    Continue reading...

                    Hyperledger Welcomes Project Indy

                    The Sovrin Foundation announced at the 24th Internet Identity Workshop (IIW) that its distributed ledger, custom-built for independent digital identity has been accepted into incubation under Hyperledger, the open source collaborative effort created to advance cross-industry blockchain technologies hosted by The Linux Foundation.
                    Continue reading...

                    A Universal Trust Framework

                    The Internet has never had a universal trust framework before. Imagine if you could build the next sharing economy application without having to also build the platform that helps people trust. This post describes a universal trust framework that is open to all. Sovrin changes the world by providing a universal means of trusting.
                    Continue reading...

                    Google Plus: On Trust, Reputation, Pseudonyms, and Value

                    Google made an architectural decision to require real names, rather than pseudonyms, on Google Plus. The result is a platform that encourages better reciprocal acts and thus creates more value, for users as well as Google, than one based on pseudonyms.
                    Continue reading...

                    Google, China, and Trust

                    Yesterday Google redirected google.cn to Google's Hong Kong site after a many month-long war of words between Google and the Chinese government. Google accused the Chinese government of industrial espionage and has been chaffing under the Chinese government's requirement for censorship. There's a lot of commentary about Google destroying their chances to compete in the world's fastest growing economy, but I want to focus on something else. Google was caught between what it thought was the right thing and it's desire--some would say need--to do business in China. Google chose the right thing. One of the
                    Continue reading...

                    Trust-Based Recommendation Systems

                    Reid Andersen from Microsoft Research is talking about trust-based recommendation systems (PDF). To build a personalized recommendation, you need a trust graph among users. What system should you use to determine the recommendation? The researchers use an axiomatic approach. The context of their axiomatic system is social choice theory (see Arrow's impossibility theorem for voting systems from 1951). More recent treatments are Webpage ranking systems (Altman, Teeneholtz, '05). The details are fairly complex, but the basic idea is that by proposing axioms until you get an inconsistency in the axiom set and then backing off and exploring other axioms
                    Continue reading...

                    Spending Loyalty

                    Radiohead is earning customer loyalty while Apple spends it.
                    Continue reading...

                    Dick Hardt on Trust

                    Dick Hardt is giving a new talk at Defrag. He's talking about trust; his thesis is that trust defrags identity. Much of what's he's saying is right in line with the reputation work (PDF) my students and I have been working on. He makes a critical link to identity: identifiers bind personas together to increase trust. Intuition doesn't work well online because of the absence of clues and the ability to create false context. Institutions haven't done much better. He brings up another key concept this is largely about accountability. Key point: binding behavior from multiple sites together leads
                    Continue reading...

                    Karen Stephenson on Social Network Analysis

                    If you miss PopTech! on IT Conversations (and I do) then listen to this talk by Karen Stephenson on Social Network Analysis from MeshForum. It's every bit as good as anything from PopTech! Whether you're interested in social networking, organizational issues, management, or group interaction, there's something here for you. Fascinating stuff.
                    Continue reading...

                    Repricocity, Trust, and Reputation

                    Chris Slater presented A Computational Model of Trust and Reputation today in class. The paper introduces three concepts--reputation, reciprocity, and trust--and how they relate to each other. We talk a lot about reputation and trust, but don't often consider reciprocity. They define reciprocity as a "mutual exchange of deeds (such as favor or revenge)." In a reputation system focused on stopping blog comment spam, for example, the engine that calculates the score is calculating reputation, the threshold that you set in your software (e.g. moderate commenters with scores below 20) is the trust metric. Reciprocity is the probability that
                    Continue reading...

                    Trusting Steve Gillmor

                    One of my favorite shows on IT Conversations was the Gillmor Gang. I say "was" because Steve's show hasn't been on IT Conversations for quite some time. That doesn't mean it's dead, however...The Gillmor Gang lives on at Podshow.com. I like the new Gillmor Gang. Its very unlike most things you hear--presentations or interviews. Listening to the Gillmor Gang is more like being a fly on the wall at a lunch with these guys. I know because I've been at lunch with many of these guys and this is just what it's like. The problem is that I always
                    Continue reading...

                    Towards and Open Identity Layer

                    The first afternoon session was on Towards and Open Identity Layer and Trusted Exchange: What Might it Look Like? The panelists were Paul Trevithick, Parity Communications; Dale Olds, Novell; Tony Nadalin, IBM; Kim Cameron, Microsoft; and Marc Rotenberg, EPIC. John Clippinger, Berkman Center was the moderator. One of the topics that was discussed was security. Kim Cameron made the point that CardSpace doesn't build all the walls that might need to be built, but it changes the paradigm so that the walls can be built. Marc Rotenberg brought up the issue of electronic voting systems. He says that there
                    Continue reading...

                    Trusting Google Authentication

                    In an earlier entry, I said With no fanfare at all, Google has created a universal login for anyone who wants to use it. From Phil Windley's Technometria | Using Google's Universal Authentication EngineReferenced Tue Mar 21 2006 08:22:50 GMT-0700 (MST) Well, not quite. I had a couple of my students, Devlin Daley and Harsh Nagaonkar spend a little time playing with it. As presently constituted, the token you get back is long lived and replayable. It's better than giving a third party site your password, but not much. Anyone with your token can use it to log in
                    Continue reading...

                    Twelve Reasons Not to Use Microsoft

                    Robert Scoble lists twelve reasons people tell him they don't use Microsoft. The thread has over 100 comments. Interesting reading.
                    Continue reading...

                    IIW2005: Paul Trevithick on Higgins Trust Framework

                    Identity is a three-body problem. When you use a credit card, there's pre-existing trust between the airline and the bank (brokered by Visa). You're the third party in that equation. Lots of groups that we belong to, lots of implementations. People want to manage relationships between extremely diverse contexts. This is where the Higgins Trust Framework (HTF) comes in. The goal of the HTF is to address four challenges: the lack of common interfaces to identity/networking systems, the need for interoperability, the need to manage multiple contexts, and the need to respond to regulatory, public or customer pressure to
                    Continue reading...