Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Better management of consent, to give more control to the user of their data when accessing and using services. 
  •  Technical innovation in privacy enhancing technologies, such as cryptography, federated identity, security and privacy for IoT, privacy-enhancing data transports and data at rest.
  •  The application of artificial intelligence/machine learning/neural networks to serve the user’s interests.
  • Bootstrapping trust at the protocol level, to maintain a trustable Internet Infrastructure.


An indicative list of possible areas of concern/opportunities (specific topics) is provided below:

...

Topics focused on App implementations to manage the plethora of Information Sharing Agreements and consents that a person would agree to, manage and re-use over time (Type 2 or Type 3 proposals only)

  • Solutions enabling users to get trust on privacy terms  
  • Solutions enabling users to more easily and uniformly set preferences or terms such as machine-readable privacy terms (IEEE - P7012) and technologies that help to reduce the risk that GDPR is misused to further exploit/ complicate the user experience. 
  • Efficient techniques to anonymize personal data in the era of Big Data.
  1. Technical innovation in privacy enhancing technologies, such as cryptography, federated identity, security and privacy for IoT, privacy-enhancing data transports and data at rest.
  • Simplified multifactor authentication  
  • Option for encrypted devices/data at rest. i.e. an option for the user to prevent being forced to decrypt their data under, such as physical threat.
  • Cybersecurity certification for ICT products, processes and services in the EU (EU Cybersecurity Act).
  • Solutions that improve algorithm agility (where deployed algorithms are superseded and must be replaced).
  • Improved information for users about the security mechanisms in use by apps (browsers give the user some clues about e.g. TLS; apps give none).
  • Pilot implementation of specifications, standards, acceptance criteria and measurement frameworks for new identifiers, for instance:

...

  • Mobile Driving Licenses;

...

  • Delegation in the context of ID;

...

  • eID and authentication services to support, for instance student mobility and access to educational services, thin file individuals, disabled users, refugees, non-digital natives, lost identities due to natural disasters etc.
  • Solutions that enable the user to more easily and uniformly set preferences or terms such as machine-readable privacy terms (IEEE - P7012) and technologies that help to reduce the risk that GDPR is misused to further exploit/ complicate the user experience. 
    Services and technologies that enhance transparency, user intervenability, and accountability in data processing.
  • projects which bridge the gap between technological enhancements on one side and their actual uptake by non-expert users of the internet on the other side
  • With a view to next generation certificates, how can European grid certificate authorities build up user-friendly mechanisms that promote a changed user experience and awareness and addresses forms of identity that comply with EU law and or meet specific European needs.


  1. The application of artificial intelligence/machine learning/neural networks to serve the user’s interests.
  • User-centric design, simplicity, usability, edge AI (‘artificial intelligence’)
  • Taking into account the recommendations of the EU High Level Expert Group on AI, a scientific and empirical approach is needed, such as developing guidance on how to approach access and acquisition of data for the development/expansion of AI, operationalize those recommendations in order to strengthen the capacity/ability of the Internet industry in Europe.
  • Explainable artificial intelligence (XAI) for improving human trust in artificial intelligence (AI) systems
  • Quantum resistant computing
  1. Bootstrapping trust at the protocol level, to maintain a trustable Internet Infrastructure.
  • DNS-based security of the Internet Infrastructure (DNSSEC, DOH approach), given the need to reinforce trust in a world of “deep fake”. 

The call is open to individuals or organisations, or groupings thereof.

...

Support and further information:

The NGI_TRUST consortium will organise a number of webinars and be present at a number of events during the period October-November 2019 to discuss with interested applicants.  Please take a look at: NGI Trust Webinar for potential applicants for information about the second call online open day.

Please check for further information published on the NGI_TRUST open call wiki pages & follow our twitter account: https://twitter.com/NgiTrust if you would like to register for one of these sessions.

For further information or if you have any question, please contact the NGI_TRUST support team: NGI-Trust-support@lists.geant.org

...