Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 20 Next »

This DG - National Strategy for Trusted Identities in Cyberspace operates under the Kantara Initiative IPR Policies - Option Creative Commons Attribution-Share Alike

JOIN THE NSTIC DG | SUBSCRIBE | MAILMAN ARCHIVE | GOOGLE ARCHIVE

Read the full charter.

NOTE: On July 18, 2011 the NSTIC DG approved its response to the NSTIC NOI. As such, this Discussion Group is not holding meetings until needed or unless called for (at any time with reasonable notice) by any Participant of the NSTIC DG.

References:

Background:

The US Government through the National Institute of Standards and Technology (NIST) has released the National Strategy for Trusted Identities in Cyberspace (NSTIC) vision, mission and goals. This strategy has a goal to foster a public/private partnership where industry and communities come together to solve the issues identified in the NSTIC to create and identity ecosystem which enables web service interactions to be:

  • Faster: Once you use your credential to start an online session, you would not need to use separate usernames and passwords for each Web site. For example, your computer or cell phone could offer your "trusted ID" to each new site where you want to use the credential. The system would work much like your ATM card works now. By having the card and a PIN you can use your ATM card all over the world. By having a credential and a password you would be able to use your trusted ID at many different sites. This saves you time while enhancing security. No more searching in your drawer for your list of passwords.
  • More convenient: Businesses and the government will be able to put services online that have to be conducted in person today like transferring auto titles or signing mortgage documents.
  • Safer: Your trust credential will foil most commonly used attacks from hackers and criminals, protecting you against theft and fraud, safeguarding your personal information from cyber criminals.
  • Private: This new "identity ecosystem" protects your privacy. Credentials share only the amount of personal information necessary for the transaction. You control what personal information is released, and can ensure that your data is not centralized among service providers.
  • Voluntary: The identity ecosystem is voluntary. You will still be able to surf the Web, write a blog, participate in an online discussion, and post comments to a wiki anonymously or using a pseudonym. You would choose when to use your trusted ID. When you want stronger identity protection, you use your credential, enabling higher levels of trust and security.

The NSTIC program office team from time to time releases a Notice of Inquiry (NOI) and/or comment period where comments are solicited from industry and communities as input to the NSTIC team for consideration.

It is anticipated that this DG will be comprised of stakeholders who represent area segments including: industry, user-centric, consumer, public policy, privacy, governance and international.

Interim Chair:

Richard Wilsher, Zygma

Secretary:

open

Dial-In:

DAY: Tuesdays

TIME: 11:00 PT

  • Dial-In details
    Skype: ++99051000000481
  • US Dial-In: +1-805-309-2350
  • Conference ID: 178-2540
International Toll:
  • Austria +43 (0) 720881948
  • Belgium +32 (0) 70357134
  • Canada +1 (201) 793-9022
  • France +33 (0) 826109071
  • Germany +49 01805009527
  • Ireland +353 (0) 818270968
  • Italy +39 848390177
  • Spain +34 (9) 02885791
  • Switzerland +41 (0) 848560397
  • United Kingdom +44 (0) 8454018081

Navigate space

Recently Updated

  • No labels