You are here: Resources > FIDIS Deliverables > HighTechID > D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication > 

D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication

Designing protocols with or without privacy experts  Title:
CONCLUSION
 Summary and conclusions

 

Conclusion

It is too early to conclude much on Next Generation Internet protocols as such – it will take some time before more practical experiences can be collected. In any case, the development of the next generation of the Internet opens an opportunity to smooth away past mistakes in specifications and implementations. Still, the integration of all relevant stakeholders including privacy experts, as demanded in Section 4.5, will be missed again. Or, to phrase is differently, at most very few privacy experts - if any - will participate in this important area of specification and standardisation. The last section of this chapter has dealt with the design process of protocols and the immanent lack of participation of privacy experts, yielding in specifications which often do not fulfil privacy requirements such as data minimisation or transparency. 

 

Designing protocols with or without privacy experts  fidis-wp3-del3.8_Study_on_protocols_with_respect_to_identity_and_identification.sxw  Summary and conclusions
schulte 25 / 30