Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management
Conclusion
The deliverable gave a description of the Trusted Computing technology status and functionalities, and important specifications of the TCG. It also shed the light on the current and future applications and possible scenarios, in addition to the market status and R&D efforts in the field. It also tackled the controversial and legal aspects of TC before giving a perspective on the use of TC for identification and identity management purposes.
It is clear from the findings that TC has reached an advanced level of detailed specifications, with a fast increasing market and extensive research in the fields. It is also evident that there are many still hidden fields of application for TC, and the analysis given in chapter 8 should raise the awareness to the advantages of TC in the field of identity management, but also in enabling and supporting business cases such as mobile commerce by improving identification and authentication mechanisms.
While legal consideration should also be coupled with the TC technological advancement, it is of great importance to begin a real assessment of the feasibility of the proposed use cases, and the extent to which TC can bring forward the notion of Digital Identity, and improve identification and identity management systems.
36 / 38 |