Governance Models for Interoperable Electronic Identities

Current implementations of electronic identity in Europe are rather diverse; they include state-driven identity management frameworks as well as private sector frameworks and different forms of public-private collaborations. This diversity may represent a major challenge for the deployment of information society services addressed towards the European internal market. This raises the question: How can we achieve interoperability of electronic identities across Europe, and potentially beyond Europe’s borders? This paper argues that the interoperability of electronic identity could be governed by a multi-stakeholder governance framework that brings together different parties with interests in the provision and use of electronic identities. Such a governance framework could, for example, consist in designing and operating a portal with common functionalities that allows interoperable authentication across multiple domains and contexts. Inspiration for the governance of such a portal could come both from existing successful implementations of electronic identity and from multi-stakeholder institutions that have proven useful in Internet governance.

[1]  W. J. Drake,et al.  Introduction: The Distributed Architecture of Network Global Governance , 2008 .

[2]  Milton L. Mueller,et al.  Disrupting Global Governance: The Internet Whois Service, ICANN, and Privacy , 2008 .

[3]  Alexander Roßnagel,et al.  An ID card for the Internet - The new German ID card with "electronic proof of identity" , 2010, Comput. Law Secur. Rev..

[4]  Thomas Myhr Legal and organizational challenges and solutions for achieving a pan-European electronic ID solution: or I am 621216-1318, but I am also 161262-43774. Do you know who I am? , 2008, Inf. Secur. Tech. Rep..

[5]  Jon Finke Identity Management , 2006, LISA.

[6]  Norberto Nuno Gomes de Andrade Towards a European eID Regulatory Framework , 2012, European Data Protection.

[7]  Tommy Tranvik,et al.  IP Addresses - Just a Number? , 2011, Int. J. Law Inf. Technol..

[8]  Ravi S. Sandhu,et al.  Identity management , 2003, IEEE Internet Computing.

[9]  A. Froomkin,et al.  Habermas@discourse.net: Toward a Critical Theory of Cyberspace , 2003 .

[10]  Milton L. Mueller,et al.  Internet Governance: Infrastructure and Institutions , 2010, J. Assoc. Inf. Sci. Technol..

[11]  Edgar A. Whitley,et al.  Ruling the Root: Internet Governance and the Taming of Cyberspace , 2004 .

[12]  Georg Borges Rechtsfragen der Haftung im Zusammenhang mit dem elektronischen Identitätsnachweis , 2011 .

[13]  Laura DeNardis,et al.  Opening standards : the global politics of interoperability , 2011 .

[14]  A. Pfitzmann,et al.  A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management , 2010 .

[15]  Tobias Mahler,et al.  Identity management and data protection law: Risk, responsibility and compliance in 'Circles of Trust' - Part II , 2007, Comput. Law Secur. Rev..