Difference between revisions of "Trusted Third Party"

From MgmtWiki
Jump to: navigation, search
(Context)
(Solutions)
(One intermediate revision by the same user not shown)
Line 6: Line 6:
  
 
==Problems==
 
==Problems==
 
+
Any party that holds [[User Information]] has the possibility of breach of trust that the information will not be released.
  
 
==Solutions==
 
==Solutions==
 
Some types of [[Trusted Third Party]] include:
 
Some types of [[Trusted Third Party]] include:
 
* Privacy Enhancing Technology Providers (PETP) can protect user's privacy by anonymizing the [[User]]'s [[Identifier]]. See Microsoft UProve.<ref>Microsoft, ''U-Prove.'' https://www.microsoft.com/en-us/research/project/u-prove/</ref> or IBM Identity Mixer.<ref>IBM. ''Identity Mixer.'' https://www.zurich.ibm.com/identity_mixer/eu_projects.html</ref>
 
* Privacy Enhancing Technology Providers (PETP) can protect user's privacy by anonymizing the [[User]]'s [[Identifier]]. See Microsoft UProve.<ref>Microsoft, ''U-Prove.'' https://www.microsoft.com/en-us/research/project/u-prove/</ref> or IBM Identity Mixer.<ref>IBM. ''Identity Mixer.'' https://www.zurich.ibm.com/identity_mixer/eu_projects.html</ref>
 +
* Governmental agencies that hold data for legitimate purposes will typically have a legal mandate to protect the data. Unfortunately they also have sovereign immunity should a breach be discovered.
  
 
==References==
 
==References==

Revision as of 08:09, 26 November 2018

Full Title or Meme

Any Web Site that is known to be trusted by all of the parties to an interchange.

Context

A Trusted Third Party may be valuable in any use case where the user wants to be have some Assurance about privacy of data that does need to be shared in very limited circumstances.

Problems

Any party that holds User Information has the possibility of breach of trust that the information will not be released.

Solutions

Some types of Trusted Third Party include:

  • Privacy Enhancing Technology Providers (PETP) can protect user's privacy by anonymizing the User's Identifier. See Microsoft UProve.[1] or IBM Identity Mixer.[2]
  • Governmental agencies that hold data for legitimate purposes will typically have a legal mandate to protect the data. Unfortunately they also have sovereign immunity should a breach be discovered.

References

  1. Microsoft, U-Prove. https://www.microsoft.com/en-us/research/project/u-prove/
  2. IBM. Identity Mixer. https://www.zurich.ibm.com/identity_mixer/eu_projects.html