![Page 1: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/1.jpg)
We Make The Ne t
Work
Identity, Privacy and Trust Management Identity, Privacy and Trust Management for e-Governmentfor e-Government
Dr. Hellmuth BrodaChief Technology Officer
EMEAMember, Sun Vision [email protected]
Presence and Future
28 Oct 2003Hotel FORUM
Bratislava
![Page 2: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/2.jpg)
Everything and EverybodyConnected to the Network
Sun’s Vision
![Page 3: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/3.jpg)
1980 1990 2000
Innovation Pays
![Page 4: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/4.jpg)
4
The Revolution
10M
1B
10B
1T
100B
1990 2000 2010 2020
Computers People Everything
Cost toConnect
ThingsConnected
$100
$1
1¢
![Page 5: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/5.jpg)
Networks will decompose the PCNetworked displays
Storage
Services
Internet
![Page 6: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/6.jpg)
All about state
Personal ComputerState Attractor
Personal NetworkState Distributor
calendarfriends & family
album
music
bookmarks
![Page 7: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/7.jpg)
...The Über-device?
![Page 8: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/8.jpg)
8
Ultimate Mobility VisionSecure Access Points Everywhere
Secure JavacardAuthentication
Completely Stateless
Sun today uses20,000 Sun Rays
![Page 9: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/9.jpg)
JavaCardA universal ID- and Function Card isReplacing Single Usage Cards
=
Employment Card/Entry Card
Sun RayMT Server mobileDial-In Card
PKI-Authentication with Token Card/x509
Safeword Challenge/ Response Card
ePurse/Money Card
![Page 10: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/10.jpg)
10
Web services are modular software components written in any language, but expressed through standard interfacesXML wrapper around the service written in Java or other languageSOAP to communicate between servicesWSDL to describe a service in a registryUDDI to define the registry
Applications can be built with any combination of web services located anywhere
Services can be registered and discovered all across the intranet or Internet
What Is a Web Service ?
![Page 11: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/11.jpg)
11
Web Services in the Future
Getting to Heathrow from a meeting in downtown London
Concert of your favourite musician
Planning a meeting of 15 executives from different companies
Traffic info that works (real time)And across different modes of travel
Family vacations . . .
![Page 12: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/12.jpg)
How Can We Get There?
The biggest obstacle is lack of interoperability
Without standards interoperability is not achievable
Web Services offer standards for heterogeneous SW/HW environments
Architecture needed for integratability
![Page 13: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/13.jpg)
Where Are We Today?
Services only for humans (For Your Eyes Only --- not other services)
Application silos make cooperation impossible
Identity silos fragment user information
![Page 14: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/14.jpg)
14
Today’s Collection of Net Identity Silos
Joe’s Fish Market.Com
Tropical, Fresh Water, Shell Fish, Lobster,Frogs, Whales, Seals, Clams
![Page 15: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/15.jpg)
How We Have Been Building Systems
![Page 16: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/16.jpg)
Our World of Application Silos
D
A
R
T
D
A
R
T
D
A
R
T
D
A
R
T
D
A
R
T
D
A
R
T
D
A
R
T
D
A
R
T
D
A
R
T
D
A
R
T
D
A
R
T
D
A
R
T
D
A
R
T
D
A
R
T
D
A
R
T
D
A
R
T
Da ta
App lica t io
nReport
Trans act io
ns
??
Rudim en tary ho riz on ta l com m uin icat ion
![Page 17: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/17.jpg)
Future Architectures (Java E. S.)
Ap p lica tion andWeb Servers
Id entity and Com m unica ti
ons
Porta l
Op era ting Environm ent
Services
Crea tion
Integra tion
Server
CUSTOM
BUSINESS LOGIC
Develop m ent Environm ent
Directory
![Page 18: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/18.jpg)
Commerce on the InternetWhat keeps customers from doing
commerce over the internet?Know who you are talking to (identity crisis)
Globally accepted and secure payment systems
Risk but not trust management
Privacy concerns
![Page 19: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/19.jpg)
Identity is the most basic element in Identity is the most basic element in a high-value relationship witha high-value relationship with
customers, employees, citizenscustomers, employees, citizens or or business partners business partners
Identity and Business
![Page 20: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/20.jpg)
What Has to Be Identified?
Persons (real people) in their roles
Legal entities (companies, agencies, corporations, . . .)
Things (air quality monitoring sensor, traffic counter, . . .)
RFID tags; DRM
Software services, agents, . . .
![Page 21: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/21.jpg)
21
Identity Theft – Fastest Growing Crime
Fed. Trade Commission is worriedToday, solutions offered only for parts of the problemEbay examples
![Page 22: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/22.jpg)
22
A Network of ThingsAuto ID – RFID Tags
Note: By 2005 WallMart will only accept merchandise with RFID tags attached!
![Page 23: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/23.jpg)
Wide Range of ApplicationsAutoID has applications in virtually every industry
RetailLower Labour CostsReducing InventoriesLocating ProductsReal-time supply/demand dataSmart ShelvesCustomer Convenience
Healthcare/PharmaTracking Hospital EquipmentPatient ID and TrackingPreventing Medical ErrorsTracking Samples, Vials etc.Environmental Monitoring (e.g. Blood Samples)Anti-Counterfeit MeasuresProduct Recalls
Transport / Logistic
Asset Utilization & TrackingVolume PlanningAutomated SortingAutomated Data CaptureShipment Route TracingDelivery Reliability/EfficiencyContract Pricing VerificationReduced Claim Cost
GovernmentHomeland SecurityMilitary/Defence Asset Tracking
ManufacturingQuality ControlLot TrackingRecallsGovernment RegulationsInventory AccuracyLabor & Material CostsAsset UtilizationSupplier ManagementCustomer RelationsSupply Chain MgmtInventoryGray Market, TheftShrinkageShop Floor Execution
OtherPayment SecurityTheme Park ApplicationsFarm Animal Tracking
![Page 24: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/24.jpg)
Privacy Concerns Kill Or Delay Projects
Swiss EasyRideDelayed also due to consumer concerns on the privacy of the location and time information
Benetton RFID tags in clothes' labelsPublic consumer group pressure led Benetton to abandon plans
Consumers Against Supermarket Privacy Invasion and Numbering delay Prada store
RFID projectProject is for up-to-date inventory Source (2,3):
Wired News 8 Apr 03
![Page 25: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/25.jpg)
How We Can Build TrustThe biggest concern of the principal/patient/customer is privacy
Privacy is not just a technical issue
It is about managing the trust of the principal/patient/customer
What does an architecture for privacy and trust management look like?
![Page 26: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/26.jpg)
26
Architecture for Trust Management Definitions
A combinationof business and technology practices which define how a relationship is conducted and services are performed
A set of rules governing decisions about what the user can do: access to information, services or resources
Assertion of validity of a set of credentials. Credentials express a person´s identity.“A Yes/No answer”
Policy
Authorization
Authentication
Identity
Se
cu
rity
Ma
nag
em
en
tId
en
tity
Ma
na
ge
me
nt
Basic set of information that creates a “unique” entity (a name with a corresponding set of attributes)
![Page 27: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/27.jpg)
27
Architecture for Trust Management Real World Example: Drivers License
4. The fact that we do have police; the rules that allow me to drive with my national license in other countries
3. The policeman will then see which kind of vehicle you are authorized to drive and if you are allowed to drive the one you are operating now
2. Assertion of validity: The policeman compares the document with you. Result: “A Yes/No answer”
Policy
Authorization
Authentication
Identity
Se
cu
rity
Ma
nag
em
en
tId
en
tity
Ma
na
ge
me
nt
1. Name, address, picture identify the driver and provide together with the document the credentials expressing that the carrier is identical to the person that passed the driving tests
![Page 28: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/28.jpg)
28
Architecture for Trust Management Digitally Speaking . . .
4. Business practices to manage risk, enforce security/privacy, provide auditability.User, customer preferences, history, personalized services,
3. Determination of access rights to systems, applications and information: Match credentials against profiles, ACLs, policy
2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting them is indeed the person to which credentials were originally issued. accept or reject
Policy
Authorization
Authentication
Identity
Se
cu
rity
Ma
nag
em
en
tId
en
tity
Ma
na
ge
me
nt
1. User, customer, device “facts”, e.g., name, address, ID, DNA, keys; credentials, certificates that were issued e. g. by a Certification authority
![Page 29: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/29.jpg)
How People Will Trust Policies
Policy and its audit are guaranteed and certified by a approved public or private agency (federal data protection agency; TÜV; Chamber of Commerce, Postal Service or other basic service provider, . . .)
Policies and their transactions are insured. Insurances cover for possible policy violations and fraud
Liability and non-repudiation solved
Trust is based on policies and the audit of
those -- not just on security
![Page 30: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/30.jpg)
Where to Safeguard User's Information
Single IdentityOperator
Health& TravelInsurance
LoyaltyProgram
RetailBank
CarRental
HotelChain
Airline
TravelAgent
Single Point Model Open Federated ModelCredit History
Health HistoryMeal Preferences
Travel History
Insurance RecordsInsurance Records
Travel History
Meal PreferencesCredit History
Health History
Meal Preferences Car Type Preferences
![Page 31: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/31.jpg)
Insur-Insur-anceance
Circle of Trust Concept
NetworkNetworkIdentityIdentityProviderProvider
Tour Tour operatoroperator
HotelHotelChainChain
Car Car RentalRental
AirlineAirline
Limo Limo ServiceService
BankBank
TravelTravelAgentAgent
ExternalFederated
Partner
ExternalFederated
Partner
ExternalFederated
Partner
ExternalFederated
Partner
ExternalFederated
Partner
ExternalFederated
Partner
ExternalFederated
Partner
ExternalFederated
Partner
ExternalFederated
Partner
![Page 32: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/32.jpg)
Network Identity Organic Evolution
![Page 33: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/33.jpg)
Liberty Alliance solves the identity crisis
The only global body working to define and drive open technology standards and guidelines for federated identity
Addresses business, policy and technical issues associated with federated identity
Alliance of global organizations working together to enable the deployment of identity-based web services
![Page 34: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/34.jpg)
Over 160 for-profit, not-for-profit and government organizations, representing a billion customers, are currently Alliance membersThe following represent Liberty’s Board Members and Sponsors
Liberty Members
![Page 35: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/35.jpg)
Why You Should Join LibertyAccelerate the implementation and increase opportunities of internal and cross organizational processesParticipate in the development and use of business implementation guidelinesInfluence business and technical specifications to address your business needsControl business and technical risks through networking and sharing resourcesEnable your organization to understand and address global privacy concerns Partner in a multi-vendor marketplace of compliant products
![Page 36: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/36.jpg)
36
To Join Liberty: www.projectliberty.org
![Page 37: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/37.jpg)
Liberty-enabled products and services
*Delivery dates being confirmed
Communicator (available)Computer Associates (Q4*)DataKey (available)DigiGan (Q3*)Ericsson (Q4)Entrust (Q1 2004)France Telecom (Q4 2003)Fujitsu Invia (available)Gemplus (TBD)HP (available)July Systems (available)Netegrity (2004)NeuStar (available)Nokia (2004)Novell (available)
NTT (TBD)NTT Software (available)Oblix (2004)PeopleSoft (available)Phaos Technology (available)Ping Identity (available)PostX (available)RSA (Q4)Salesforce.com (TBD)Sigaba (available)Sun Microsystems (available)Trustgenix (available)Ubisecure (available)Verisign (Q4*)Vodafone (2004)WaveSet (available)
![Page 38: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/38.jpg)
Privacy and Our Future
If we do not start to take privacy concerns seriously we might as well abandon web services
Trust is the highest valued part of a business relationship
We have to plan and build privacy management into our systems from the very beginning
![Page 39: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/39.jpg)
Privacy Enabled Trusted Third Party Transactions Are Achievable Now!
?32179Hans
###
HanHanss
Request Request TokenToken
ClearingClearingBank
Logistics PartnerLogistics Partner
![Page 40: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/40.jpg)
Who Does What? Business Opportunities (1)
Identity Service Provider (national, international Example: HubID by Communicator)
Business Relationship Management inside a Circle of Trust (national, international Example: Neustar)
Management of relationships between Circles of Trust (national, international)
![Page 41: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/41.jpg)
Business Opportunities (2)Trusted Third Party Services (incl. Logistics) (national, international)
Policy audit and seal of approval (national, international)
Web page seal (international)
Clearing
International payment systems for small amounts
![Page 42: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/42.jpg)
OutlookIdentity Management will be as ubiquitous as TCP/IP
Needed: Definition of secure, auditable and certifiable infrastructures to run Identity Services
Needed: Definition of well documented and auditable identity management processes which can be certified
![Page 43: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/43.jpg)
My e-Government Vision
Governments will offer services centered around the needs of the customer (citizens) across agencies
Services are perceived as effective, efficient and trustable
Privacy of the citizens is managed in a professional manner
![Page 44: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/44.jpg)
My Personal RecommendationBuild services that are trusted by the citizens
Join the Liberty Alliance
Do not re-invent wheels, look what others did
Innovate on new services; don't electrify the status quo
Every e-Project needs a sponsor at the highest available level
Make services citizen-centric (not bureaucracy-centric)
Talk to Sun---we provide open and secure systems and we work with many governments
![Page 45: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/45.jpg)
In Conclusion:Sun's 3 Core Strategies
Accelerate ServiceAccelerate ServiceDeploymentDeployment
Attack CostAttack CostAnd ComplexityAnd Complexity
Mobility WithMobility WithSecuritySecurity
![Page 46: Identity, Privacy and Trust Management for e-Government Dr ...2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting](https://reader033.vdocuments.us/reader033/viewer/2022050315/5f77719973bcd563ce3f5fb0/html5/thumbnails/46.jpg)