Below is the running archive of past content

Top Content From 1990's and Early 2000's:

Archived versions of related to previous MIT graduate seminars, public education, prototypes, white papers, academic articles as well as other research or projects by Dazza (Daniel) Greenwood can be found at:


Top Content from 2013:


Welcome to the open public research site of the eCitizen research and development projects of Prof. Alex "Sandy" Pentland's MIT Human Dynamics Lab . These projects and initiatives are led by MIT Media Lab's Dazza Greenwood and focus on open architecture and online public infrastructure for individual identity and personal data sharing.

NSTIC Plenary Presentation by Sandy Pentland
We will post Sandy's slides here shortly and please use the following URL's for discussion and to filter up questions or comments for Sandy to address at the Friday session of the NSTIC Plenary and over a longer period of time using online services.
We are trying out the following new online discussion tool - use it to pose questions/ideas for Sandy:, login, search inq131


eCitizen Open Architecture for Individual Identity and Personal or Business Data Sharing
The eCitizen Open Architecture provides a working open source, open standards based and modular open architecture designed to be customized for different business, legal and technical contexts while maintaining the key principles of user control, integrated rules appropriate to the scenario of use and truly extensible and interoperable systems, methods and interfaces.  Proprietary code and other solutions may be substituted for the reference implementation open source code if preferable for implementers of PublicEnterprise.  The initial reference implementations are being tested against live production-grade requirements in two different contextual domains of use: to operate computation social science research studies with significant numbers of human subject and other participants and second, for a state governmental "Business Center" resource for businesses to be created and maintained with government and in a way that boosts use and new value for other state agencies, other states and levels of government and a special set of new integration and capabilities for private sector use. Using OpenID Connect, standard authorization processes, REST and other standard API based interfaces at all key boundaries between modules and components in the architecture and a careful design intended to scale for very big data at high velocity and wide varieties of use, access and creative continuing innovation by implementers, users and third parties.  

This live demo illustrates how this Open Architecture can be implemented in the context of a Kansas Business Center, and includes questions and discussion with Kansas state government partners with our project.  More information on this project is available on our project blog site: http://www.eCitizen.TV

IAuth Personal Identity and Data Sharing Solution
The slogan of this project is "I Am, Therefore IAuth".  It's about walking the walk of talk about user-centered, privacy-enhancing and informed consent.  Today, with standards like OAuth 2 and emerging related initiatives like UMA and OpenID Connect, there are more than ample tools to ensure meaningful end-user grants of authorization for access to their identity and personal data.  However, as actually implemented, there is significant ambiguity, confusion and mis-matched expectations about how personal data and identity information is accessed, used and shared by third parties - even when the process of sharing that personal information is premised on a supposed informed consent by the user them self.  By a very slight adjustment of the way apps and services implement OAuth2, it is possible to replace current dubious practices with model examples of privacy-promoting, commercially-valid best practices for user-controlled personal data sharing.  And the IAuth approach aims to provide solutions that require no significant change to business, legal or technical aspects of existing deployment of OAuth2 based "user grant of authorization" processes and implementations.  Rather, the IAuth approach focuses on how slight refinements of how the protocol is implemented can result in transformational l improvement.  

The MIT 2013 Legal Hack-a-Thon for Personal Data and Individual Identity was an online participatory week long activity to discuss, design and develop creation solutions and approaches through business, legal and technical integrated innovation with special focus on the IAuth concept. 

More information is available at the IAuth project page.

Integrated Business, Legal and Technical Model Rules 
This project is developing a reusable and highly scalable method and structure for business, legal and technical architecture and systems for multi-party, cross-boundary interoperability.  Specifically, the project has developed a generalized and highly customizable model that reflects best practices from federated identity trust frameworks and other overarching set of formal terms and transactional network rules such as supply chain trading partner agreements and payment or credit network operating rules and regulations.    An early draft of a reference implementation of the Model Rules waspublished for comment in February, 2012.  More information is available at the Model Rules project page.

Top Content from 2012: