SuperIdentity: Fusion of Identity across Real and Cyber Domains
Abstract
Under both benign and malign circumstances, people now manage a spectrum of identities across both real-world and cyber domains. Our belief, however, is that all these instances ultimately track back for an individual to reflect a single 'SuperIdentity'. This paper outlines the assumptions underpinning the SuperIdentity Project, describing the innovative use of data fusion to incorporate novel real-world and cyber cues into a rich framework appropriate for modern identity. The proposed combinatorial model will support a robust identification or authentication decision, with confidence indexed both by the level of trust in data provenance, and the diagnosticity of the identity factors being used. Additionally, the exploration of correlations between factors may underpin the more intelligent use of identity information so that known information may be used to predict previously hidden information. With modern living supporting the 'distribution of identity' across real and cyber domains, and with criminal elements operating in increasingly sophisticated ways in the hinterland between the two, this approach is suggested as a way forwards, and is discussed in terms of its impact on privacy, security, and the detection of threat.
- Authors:
- Publication Date:
- Research Org.:
- Pacific Northwest National Lab. (PNNL), Richland, WA (United States)
- Sponsoring Org.:
- USDOE
- OSTI Identifier:
- 1045113
- Report Number(s):
- PNNL-SA-86457
400904120; TRN: US201214%%941
- DOE Contract Number:
- AC05-76RL01830
- Resource Type:
- Conference
- Resource Relation:
- Conference: ID360: The Global Forum on Identity, April 23-24, 2012, Austin, Texas
- Country of Publication:
- United States
- Language:
- English
- Subject:
- 99 GENERAL AND MISCELLANEOUS//MATHEMATICS, COMPUTING, AND INFORMATION SCIENCE; DETECTION; DISTRIBUTION; EXPLORATION; SECURITY; Identification; Verification; Biometrics; Cyber-Identity
Citation Formats
Black, Sue, Creese, Sadie, Guest, Richard, Pike, William A, Saxby, Steven, Stanton Fraser, Danae, Stevenage, Sarah, and Whitty, Monica. SuperIdentity: Fusion of Identity across Real and Cyber Domains. United States: N. p., 2012.
Web.
Black, Sue, Creese, Sadie, Guest, Richard, Pike, William A, Saxby, Steven, Stanton Fraser, Danae, Stevenage, Sarah, & Whitty, Monica. SuperIdentity: Fusion of Identity across Real and Cyber Domains. United States.
Black, Sue, Creese, Sadie, Guest, Richard, Pike, William A, Saxby, Steven, Stanton Fraser, Danae, Stevenage, Sarah, and Whitty, Monica. 2012.
"SuperIdentity: Fusion of Identity across Real and Cyber Domains". United States.
@article{osti_1045113,
title = {SuperIdentity: Fusion of Identity across Real and Cyber Domains},
author = {Black, Sue and Creese, Sadie and Guest, Richard and Pike, William A and Saxby, Steven and Stanton Fraser, Danae and Stevenage, Sarah and Whitty, Monica},
abstractNote = {Under both benign and malign circumstances, people now manage a spectrum of identities across both real-world and cyber domains. Our belief, however, is that all these instances ultimately track back for an individual to reflect a single 'SuperIdentity'. This paper outlines the assumptions underpinning the SuperIdentity Project, describing the innovative use of data fusion to incorporate novel real-world and cyber cues into a rich framework appropriate for modern identity. The proposed combinatorial model will support a robust identification or authentication decision, with confidence indexed both by the level of trust in data provenance, and the diagnosticity of the identity factors being used. Additionally, the exploration of correlations between factors may underpin the more intelligent use of identity information so that known information may be used to predict previously hidden information. With modern living supporting the 'distribution of identity' across real and cyber domains, and with criminal elements operating in increasingly sophisticated ways in the hinterland between the two, this approach is suggested as a way forwards, and is discussed in terms of its impact on privacy, security, and the detection of threat.},
doi = {},
url = {https://www.osti.gov/biblio/1045113},
journal = {},
number = ,
volume = ,
place = {United States},
year = {Mon Apr 23 00:00:00 EDT 2012},
month = {Mon Apr 23 00:00:00 EDT 2012}
}