Technologies of Identity
Should we trust hardware any more than we trust code or software? Why? What are the differences? In order to trust a device or system to perform actions on our behalf, whether it is some form of local data processing (e.g., word processing) or an electronic commerce activity (e.g., ordering goods via the Internet), we have to have trust in the devices that perform these actions on our behalf. Certainly, we are confident that our Selectric typewriters will remain uninfected by viruses. By contrast, we cannot have the same level of trust in our word processors regarding viruses. On the other hand, a Selectric has far fewer features than a word processor.
KeywordsSmart Card Identity Management Reputation System Biometric System Identity Theft
Unable to display preview. Download preview PDF.