Privacy and 4G Services: Who Do You Trust?
23 October 2003
Ih this paper we address the conflicting requirements where privacy constraints restrict the sharing of information whereas innovative applications, prosecution and prevention require it. We propose a distributed identity management architecture featuring a network-based agent that protects the end-user privacy as much as reasonable and feasible, and yet show how this architecture supports personalised, contect-aware services. We argue that ultimately the issues on end-user privacy boil down to one question: Who do you trust?