{"title":"与主体的联系","authors":"M. Carvalho","doi":"10.1109/CCST.2013.6922035","DOIUrl":null,"url":null,"abstract":"Are assigned digital IDs really ours? How deeply is a digital credential tied to owner and how much real life and system interactions can rely on them? This article discusses the digital identities in real world scenarios, how they are bound to us and their comparison with conventional identification documents.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Bonds to the subject\",\"authors\":\"M. Carvalho\",\"doi\":\"10.1109/CCST.2013.6922035\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Are assigned digital IDs really ours? How deeply is a digital credential tied to owner and how much real life and system interactions can rely on them? This article discusses the digital identities in real world scenarios, how they are bound to us and their comparison with conventional identification documents.\",\"PeriodicalId\":243791,\"journal\":{\"name\":\"2013 47th International Carnahan Conference on Security Technology (ICCST)\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 47th International Carnahan Conference on Security Technology (ICCST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.2013.6922035\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 47th International Carnahan Conference on Security Technology (ICCST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2013.6922035","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Are assigned digital IDs really ours? How deeply is a digital credential tied to owner and how much real life and system interactions can rely on them? This article discusses the digital identities in real world scenarios, how they are bound to us and their comparison with conventional identification documents.