Briefly described the Clustered ID approach.

What will be an ideal response?


Under this approach, there is a single ID for a cluster of related transactions. For example, all activities under a single company would use a single employee number. However, an entity would be allowed to operate at multiple clusters. In other words, multiple IdM projects would exist and multiple IDs would be expected as opposed to a single universal ID. This method would assure that no single identifier could follow an entity everywhere. The theory here is that people should enjoy the ease of single sign-on within an identity realm, but a single ID is neither necessary nor desirable due to privacy and liberty concerns. Any implementation of the Liberty Alliance specification would be an example of clustered ID.

Computer Science & Information Technology

You might also like to view...

Given that the variable hours has a value of 10, the following expression would evaluate to what value? hours / 5 + 2

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is the largest unit of measure?

A) Terabyte B) Megabyte C) Petabyte D) Kilobyte

Computer Science & Information Technology

The _________ element, which replaced theembedelement, is used for any type of content such as sound, video clips, graphic images, PDF files, and even the content of other web pages.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) __________ is a software program or hardware appliance that can intercept, copy, and interpret network traffic.

A. packet scanner B. packet sniffer C. honeypot D. honey packet

Computer Science & Information Technology