数字身份认证入门(影印版)
Phillip J. Windley
出版时间:2023年03月
页数:446
“本书有助于我理解可验证凭证的细微差别,以及我们如何在犹他州使用数字身份认证来改善市民的生活。”
——Alan Fuller
犹他州首席信息官

为什么公司难以获得正确的数字身份认证?如果你还在为网站身份验证等简单的认证问题苦苦挣扎,这本书就是你需要的答案。作者Phil Windley提供了相关的概念框架,帮助你理解协议、标准以及可用的解决方案,同时给出了应用时机和场合的建议。
通过将现今的社交登录解决方案与新兴的自我主权身份认证问题联系起来,本书解释了数字身份认证的工作原理,帮助你牢固地把控事态发展,同时还展示了如何使用数字身份认证来解决最紧迫的认证问题。开发人员、产品经理、主管和副总裁都能从中学习到如何在应用程序内部和整个企业中有效利用身份认证。
本书将帮助你:
● 理解数字身份认证的用途以及为什么数字身份认证是你的业务策略的根基
● 了解为什么“自建”数字身份认证基础设施不是个好主意
● 区分身份验证和授权等核心概念
● 比较集中式、联合式和分散式身份认证系统的属性
● 判断适合于应用的正确授权方法
● 理解信任、风险、安全和隐私等核心概念
  1. Foreword
  2. Preface
  3. 1. The Nature of Identity
  4. A Bundle of Sticks?
  5. Identity Is Bigger Than You Think
  6. No Universal Identity Systems
  7. The Road Ahead
  8. 2. Defining Digital Identity
  9. The Language of Digital Identity
  10. Identity Scenarios in the Physical World
  11. Identity, Security, and Privacy
  12. Digital Identity Perspectives
  13. Reimagining Decentralized and Distributed
  14. A Common Language
  15. 3. The Problems of Digital Identity
  16. Tacit Knowledge and the Physical World
  17. The Proximity Problem
  18. The Autonomy Problem
  19. The Flexibility Problem
  20. The Consent Problem
  21. The Privacy Problem
  22. The (Lack of) Anonymity Problem
  23. The Interoperability Problem
  24. The Scale Problem
  25. Solving the Problems
  26. 4. The Laws of Digital Identity
  27. An Identity Metasystem
  28. The Laws of Identity
  29. Fixing the Problems of Identity
  30. 5. Relationships and Identity
  31. Identity Niches
  32. Relationship Integrity
  33. Relationship Life Span
  34. Relationship Utility
  35. Transactional and Interactional Relationships
  36. Promoting Rich Relationships
  37. 6. The Digital Relationship Lifecycle
  38. Discovering
  39. Co-Creating
  40. Propagating
  41. Using
  42. Updating or Changing
  43. Terminating
  44. Lifecycle Planning
  45. 7. Trust, Confidence, and Risk
  46. Risk and Vulnerability
  47. Fidelity and Provenance
  48. Trust Frameworks
  49. The Nature of Trust
  50. Coherence and Social Systems
  51. Trust, Confidence, and Coherence
  52. 8. Privacy
  53. What Is Privacy?
  54. Correlation
  55. Privacy, Authenticity, and Confidentiality
  56. Functional Privacy
  57. Privacy by Design
  58. Privacy Regulations
  59. The Time Value and Time Cost of Privacy
  60. Surveillance Capitalism and Web 2.0
  61. Privacy and Laws of Identity
  62. 9. Integrity, Nonrepudiation, and Confidentiality
  63. Cryptography
  64. Message Digests and Hashes
  65. Digital Signatures
  66. Digital Certificates
  67. Zero-Knowledge Proofs
  68. Blockchain Basics
  69. The Limitations of PKI
  70. 10. Names, Identifiers, and Discovery
  71. Utah.gov: A Use Case in Naming and Directories
  72. Naming
  73. Discovery
  74. Heterarchical Directories
  75. Discovery Is Key
  76. 11. Authentication and Relationship Integrity
  77. Enrollment
  78. Authentication Factors
  79. Authentication Methods
  80. Classifying Authentication Strength
  81. Account Recovery
  82. Authentication System Properties
  83. Authentication Preserves Relationship Integrity
  84. 12. Access Control and Relationship Utility
  85. Policy First
  86. Authorization Patterns
  87. Abstract Authorization Architectures
  88. Representing and Managing Access Control Policies
  89. Handling Complex Policy Sets
  90. Digital Certificates and Access Control
  91. Maintaining Proper Boundaries
  92. 13. Federated Identity—Leveraging Strong Relationships
  93. The Nature of Federated Identity
  94. SSO Versus Federation
  95. Federation in the Credit Card Industry
  96. Three Federation Patterns
  97. Addressing the Problem of Trust
  98. Network Effects and Digital Identity Management
  99. Federation Methods and Standards
  100. Governing Federation
  101. Networked Federation Wins
  102. 14. Cryptographic Identifiers
  103. The Problem with Email-Based Identifiers
  104. Decentralized Identifiers
  105. Autonomic Identifiers
  106. Cryptographic Identifiers and the Laws of Identity
  107. 15. Verifiable Credentials
  108. The Nature of Credentials
  109. Verifiable Credentials
  110. Exchanging VCs
  111. Credential Presentation Types
  112. Answering Trust Questions
  113. The Properties of Credential Exchange
  114. VC Ecosystems
  115. Alternatives to DIDs for VC Exchange
  116. A Marketplace for Credentials
  117. VCs Expand Identity Beyond Authn and Authz
  118. 16. Digital Identity Architectures
  119. The Trust Basis for Identifiers
  120. Identity Architectures
  121. Algorithmic and Autonomic Identity in Practice
  122. Comparing Identity Architectures
  123. Power and Legitimacy
  124. Hybrid Architectures
  125. 17. Authentic Digital Relationships
  126. Administrative Identity Systems Create Anemic Relationships
  127. Alternatives to Transactional Relationships
  128. The Self-Sovereign Alternative
  129. Supporting Authentic Relationships
  130. Taking Our Rightful Place in the Digital Sphere
  131. 18. Identity Wallets and Agents
  132. Identity Wallets
  133. Platform Wallets
  134. The Roles of Agents
  135. Properties of Wallets and Agents
  136. SSI Interaction Patterns
  137. What If I Lose My Phone?
  138. Web3, Agents, and Digital Embodiment
  139. 19. Smart Identity Agents
  140. Self-Sovereign Authority
  141. DID-Based Communication
  142. Exchanging DIDs
  143. DIDComm Messaging
  144. Protocological Power
  145. Smart Agents and the Future of the Internet
  146. Operationalizing Digital Relationships
  147. Digital Memories
  148. 20. Identity on the Internet of Things
  149. Access Control for Devices
  150. The CompuServe of Things
  151. Alternatives to the CompuServe of Things
  152. The Self-Sovereign Internet of Things
  153. Relationships in the SSIoT
  154. Unlocking the SSIoT
  155. 21. Identity Policies
  156. Policies and Standards
  157. The Policy Stack
  158. Attributes of a Good Identity Policy
  159. Recording Decisions
  160. Determining Policy Needs
  161. Writing Identity Policies
  162. Policy Outline
  163. The Policy Review Framework
  164. Assessing Identity Policies
  165. Enforcement
  166. Procedures
  167. Policy Completes the System
  168. 22. Governing Identity Ecosystems
  169. Governing Administrative Identity Systems
  170. Governing Autonomic Identity Systems
  171. Governing Algorithmic Identity Systems
  172. Governance in a Hybrid Identity Ecosystem
  173. Governing Individual Identity Ecosystems
  174. The Legitimacy of Identity Ecosystems
  175. 23. Generative Identity
  176. A Tale of Two Metasystems
  177. Generativity
  178. The Self-Sovereign Internet
  179. Generative Identity
  180. Our Digital Future
  181. Index
书名:数字身份认证入门(影印版)
作者:Phillip J. Windley
国内出版社:东南大学出版社
出版时间:2023年03月
页数:446
书号:978-7-5766-0669-0
原版书书名:Learning Digital Identity
原版书出版商:O'Reilly Media
Phillip J. Windley
 
Phil Windley是AWS Identity的开发经理。此前,他是杨百翰大学(Brigham Young University)信息技术办公室的首席工程师和Sovrin基金会的创始主席。他也是Internet身份认证研讨会(Internet Identity Workshop)的联合创始人和组织者,这是世界上最具影响力和最悠久的身份认证会议之一,也是Digital Identity(O'Reilly出版)和The Live Web(Course Technology出版)的作者。此外,Phil是犹他州的首席信息官和iMALL公司(电子商务工具的早期先行者)的创始人兼首席技术官。
 
 
The animal on the cover of Learning Digital Identity is a nankeen night heron (Nycticorax caledonicus), also known as a rufous night heron. Nycticorax means “night raven” in Ancient Greek, and was used to describe birds of ill omen. In 1555, the term was applied to the night heron.
Nankeen night herons can be found all over Australia, generally in areas where there is permanent water. They like to roost in tall trees and foliage during the day near heavily vegetated wetlands, river margins, floodplains, swamps, parks, and gardens. They breed in colonies that can contain hundreds to thousands of breeding pairs. The largest of these colonies can be found in the Murray-Darling Basin. At twilight, they feed on insects, crustaceans, fish, and amphibians in shallow waters.
The name rufous (reddish-brown) night heron comes from the rich, cinnamoncolored upper parts of the birds. They have white undersides, a black beak, and a black crown on their large heads. Their relatively short legs are yellow, as are their feet and eyes. Compared to other herons, they are stocky and medium-sized.
Populations of nankeen night herons remain stable, so they are listed as a species of least concern on conservation lists.
购买选项
定价:129.00元
书号:978-7-5766-0669-0
出版社:东南大学出版社