Advertisement

Technologies of Identity

  • L. Jean Camp
  • M. Eric Johnson
Chapter

Abstract

Should we trust hardware any more than we trust code or software? Why? What are the differences? In order to trust a device or system to perform actions on our behalf, whether it is some form of local data processing (e.g., word processing) or an electronic commerce activity (e.g., ordering goods via the Internet), we have to have trust in the devices that perform these actions on our behalf. Certainly, we are confident that our Selectric typewriters will remain uninfected by viruses. By contrast, we cannot have the same level of trust in our word processors regarding viruses. On the other hand, a Selectric has far fewer features than a word processor.

Keywords

Smart Card Identity Management Reputation System Biometric System Identity Theft 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Science+Business Media, LLC 2012

Authors and Affiliations

  1. 1.Indiana UniversityBloomingtonUSA
  2. 2.Dartmouth CollegeHanoverUSA

Personalised recommendations