skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: SuperIdentity: Fusion of Identity across Real and Cyber Domains

Abstract

Under both benign and malign circumstances, people now manage a spectrum of identities across both real-world and cyber domains. Our belief, however, is that all these instances ultimately track back for an individual to reflect a single 'SuperIdentity'. This paper outlines the assumptions underpinning the SuperIdentity Project, describing the innovative use of data fusion to incorporate novel real-world and cyber cues into a rich framework appropriate for modern identity. The proposed combinatorial model will support a robust identification or authentication decision, with confidence indexed both by the level of trust in data provenance, and the diagnosticity of the identity factors being used. Additionally, the exploration of correlations between factors may underpin the more intelligent use of identity information so that known information may be used to predict previously hidden information. With modern living supporting the 'distribution of identity' across real and cyber domains, and with criminal elements operating in increasingly sophisticated ways in the hinterland between the two, this approach is suggested as a way forwards, and is discussed in terms of its impact on privacy, security, and the detection of threat.

Authors:
; ; ; ; ; ; ;
Publication Date:
Research Org.:
Pacific Northwest National Lab. (PNNL), Richland, WA (United States)
Sponsoring Org.:
USDOE
OSTI Identifier:
1045113
Report Number(s):
PNNL-SA-86457
400904120; TRN: US201214%%941
DOE Contract Number:  
AC05-76RL01830
Resource Type:
Conference
Resource Relation:
Conference: ID360: The Global Forum on Identity, April 23-24, 2012, Austin, Texas
Country of Publication:
United States
Language:
English
Subject:
99 GENERAL AND MISCELLANEOUS//MATHEMATICS, COMPUTING, AND INFORMATION SCIENCE; DETECTION; DISTRIBUTION; EXPLORATION; SECURITY; Identification; Verification; Biometrics; Cyber-Identity

Citation Formats

Black, Sue, Creese, Sadie, Guest, Richard, Pike, William A, Saxby, Steven, Stanton Fraser, Danae, Stevenage, Sarah, and Whitty, Monica. SuperIdentity: Fusion of Identity across Real and Cyber Domains. United States: N. p., 2012. Web.
Black, Sue, Creese, Sadie, Guest, Richard, Pike, William A, Saxby, Steven, Stanton Fraser, Danae, Stevenage, Sarah, & Whitty, Monica. SuperIdentity: Fusion of Identity across Real and Cyber Domains. United States.
Black, Sue, Creese, Sadie, Guest, Richard, Pike, William A, Saxby, Steven, Stanton Fraser, Danae, Stevenage, Sarah, and Whitty, Monica. 2012. "SuperIdentity: Fusion of Identity across Real and Cyber Domains". United States.
@article{osti_1045113,
title = {SuperIdentity: Fusion of Identity across Real and Cyber Domains},
author = {Black, Sue and Creese, Sadie and Guest, Richard and Pike, William A and Saxby, Steven and Stanton Fraser, Danae and Stevenage, Sarah and Whitty, Monica},
abstractNote = {Under both benign and malign circumstances, people now manage a spectrum of identities across both real-world and cyber domains. Our belief, however, is that all these instances ultimately track back for an individual to reflect a single 'SuperIdentity'. This paper outlines the assumptions underpinning the SuperIdentity Project, describing the innovative use of data fusion to incorporate novel real-world and cyber cues into a rich framework appropriate for modern identity. The proposed combinatorial model will support a robust identification or authentication decision, with confidence indexed both by the level of trust in data provenance, and the diagnosticity of the identity factors being used. Additionally, the exploration of correlations between factors may underpin the more intelligent use of identity information so that known information may be used to predict previously hidden information. With modern living supporting the 'distribution of identity' across real and cyber domains, and with criminal elements operating in increasingly sophisticated ways in the hinterland between the two, this approach is suggested as a way forwards, and is discussed in terms of its impact on privacy, security, and the detection of threat.},
doi = {},
url = {https://www.osti.gov/biblio/1045113}, journal = {},
number = ,
volume = ,
place = {United States},
year = {Mon Apr 23 00:00:00 EDT 2012},
month = {Mon Apr 23 00:00:00 EDT 2012}
}

Conference:
Other availability
Please see Document Availability for additional information on obtaining the full-text document. Library patrons may search WorldCat to identify libraries that hold this conference proceeding.

Save / Share: