The user of Internet services is overcome with identities. She is seldom able to transfer her
identity from one site to another. The reputation that she gains in one network is useful to
transfer to other networks. Nevertheless, she cannot profit from her constructed reputation,
and she must rebuild her identity and reputation time and again. The actual systems don’t
The Identity 2.0 model (see Figure 4.11) completely endorses the paradigms of user-centric
identity management, enabling users’ full control over their identities. Service providers will
therefore be required to change their approaches by including requests for and authentication
of users’ identity. Identity 2.0 systems are interested in using the concept of a user’s identity