Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication
TRIAD
The project TRIAD aims primarily at the problem of content delivery. The authors of TRIAD claim that many problems of the current Internet come from the fact that because of private networks (see the problems with NAT) and proprietary content, delivery techniques like load-balancing one of the most important properties of the Internet, i.e., point-to-point connections between hosts, is not given any more. In order to enable these point-to-point connections again in both directions, “TRIAD defines an explicit content layer that provides scalable content routing, caching, content transformation and load balancing, integration naming routing and transport connection setup.” (Cheriton, Gritter 2000). The authors claim that TRIAD “provides attractive solutions to mobility, virtual private networking, policy-based routing and source spoofing”. TRIAD is an overlay to the current Internet, it relies upon IPv4 (the authors claim that IPv6 is not needed with their solution since they support NAT), TCP and DNS. But TRIAD still requires some changes to current protocols like TCP, thus complicating a transition to this new overlay network in large since the Internet protocol stack has to be changed. However, the TRIAD project seems to have stopped its work, there have not been any publications since August 2004.
schulte | 22 / 30 |