Architectural & Strategical Considerations
- TYPE: Combined Session DATE: Thursday, May 16, 2013 TIME: 15:00-16:00 LOCATION: ALPSEE
In this session, we will try to complement the goals of the Life Management concept with some thoughts on the structure of the corresponding communication ecosystem.
The concept of "Life Management" was introduced by Martin Kuppinger defines the set of long-term goals for the current and ongoing development of numerous identification, authentication, and personal information protection systems. This concept places many new features, facilities, and situations under consideration.
The existing problems of authentication and privacy protection cannot be effectively solved without a clear definition of the overall architecture of the communications system for which these functions are intended. On the other hand, given the correlated architectural principles, a simple, unambiguous, and reliable solution can be found for these problems.
First and foremost, it is imperative to define the system’s purpose. We view it as a whole electronic communications ecosystem, which covers both the participants of electronic interaction and all the different kinds of communication problems, including the most complex and important ones. The need to solve problems of any complexity and importance gives rise to the requirement that communications be legally significant.
There are two component parts to any interaction between subscribers: information exchange and functional interaction, the subscribers’ joint implementation of a one-step or multistep procedure (sequence of actions). This means that a second step must be taken: add functional features to the resident information model that can perform the interactive procedures specified by the subscriber and his communication counterparties.
The resulting personal and procedural information model can be referred to as the subscriber’s electronic model, his electronic twin or personal communication robot and his resident representative in the communication space. From here on in we will use the term e-resident. In this case the subscriber can be viewed as the model prototype and the owner of the communication robot, the principal proxy of his e-resident. All other communication participants should have similar models.
By creating a communication network of e-residents, we are actually creating a complete meta-model of a community involved in electronic communications. This model will transfer all of the major communication processes into the electronic space. We will call this a "MetaSociety".
The MetaSociety model will allow us to structuralize the tools accumulated to date and integrate them into the system, as well as to solve the problems posed by the Life Management concept and prepare for the transition to the next level: Society Management.
When looking at the challenges the IT departments of organizations are faced with today, then the Computing Troika (Cloud Computing, Mobile Computing, Social Computing) and the related “Identity Explosion”, the need to deal with far more identities than ever before, are high on that list. Dealing with identities and their access is becoming increasingly complex in modern environments. On the other hand, Information Security is a major concern not only of IT but the Business, up to the CEO.
So which role can Social Media play therein? What can it catalyze with respect to the need for managing identities and access at an enterprise level, for all types of users including the customers, leads, prospects, and suspects? Will it catalyze a positive reaction or lead to an implosion of Information Security?
The panel will discuss how Social Media affects IAM and Information Security. As of now, it appears that Social Media and Privacy are an oxymoron. But must that remain? Is there a chance to move from Social Media as a risk to Social Media as a value, where employees and external parties can discuss and share information in a way that is compliant and that suits the Information Security needs of the organization? In a way that allows not only to manage information access but that supports IAM in managing all these new, external identities? How should a value-focused, risk-mitigated Social Media approach for an organization look like? What does it require from IAM, is there a benefit for IAM?
The panel will discuss these questions and provide insights in how the future Social Enterprise really can look like.
- Registration fee:
- Contact person:
Mr. Levent Kara
+49 211 23707710
- May 14 - 17, 2013 Munich/Germany
The European Identity & Cloud Conference 2013 is proud to present a large number of partners