You are here: Resources > FIDIS Deliverables > HighTechID > D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management > 

D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management

More Trusted Computing Hardware  Title:
APPLICATION SCENARIOS FOR TRUSTED COMPUTING TECHNOLOGY
 Application Areas

 

Application Scenarios for Trusted Computing Technology

Trusted Computing allows the realization of a variety of business models relying on distributed trusted third parties, or a considerably more efficient configuration of some of the existing applications. In the following, some interesting applications of increasing importance will be presented. 

 

More Trusted Computing Hardware  fidis-wp3-del3.9_Study_on_the_Impact_of_Trusted_Computing_on_Identity_and_Identity_Management_v1.1.sxw  Application Areas
17 / 38