A method for authorizing access to data within a system is disclosed herein. The method includes authenticating a first trusted user identity corresponding to a first individual and granting that first trusted user identity a trust assertion privilege. The method then calls for transmitting an invitation to a second individual, the invitation including a trust assertion from said first user, and receiving and authenticating a second trusted user identity corresponding to said second individual. The trust assertion is dependent on a subjective decision by the first user to trust the second user. Next, a trust relationship between said first and second trusted user identities is recorded.
展开▼