Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Better management of consent, to give more control to the user of their data when accessing and using services. 
  •  Technical innovation in privacy enhancing technologies, such as cryptography, federated identity, security and privacy for IoT, privacy-enhancing data transports and data at rest.
  •  The application of artificial intelligence/machine learning/neural networks to serve the user’s interests.
  • Bootstrapping trust at the protocol level, to maintain a trustable Internet Infrastructure.


An indicative list of possible areas of concern/opportunities (specific topics) is provided below:

...

Topics focused on App implementations to manage the plethora of Information Sharing Agreements and consents that a person would agree to, manage and re-use over time (Type 2 or Type 3 proposals only)

  • Solutions enabling users to get trust on privacy terms  
  • Solutions enabling users to more easily and uniformly set preferences or terms such as machine-readable privacy terms (IEEE - P7012) and technologies that help to reduce the risk that GDPR is misused to further exploit/ complicate the user experience. 
  • Efficient techniques to anonymize personal data in the era of Big Data.
  1. Technical innovation in privacy enhancing technologies, such as cryptography, federated identity, security and privacy for IoT, privacy-enhancing data transports and data at rest.
  • Simplified multifactor authentication  
  • Option for encrypted devices/data at rest. i.e. an option for the user to prevent being forced to decrypt their data under, such as physical threat.
  • Cybersecurity certification for ICT products, processes and services in the EU (EU Cybersecurity Act).
  • Solutions that improve algorithm agility (where deployed algorithms are superseded and must be replaced).
  • Improved information for users about the security mechanisms in use by apps (browsers give the user some clues about e.g. TLS; apps give none)

...

  • .
  • Pilot implementation of specifications, standards, acceptance criteria and measurement frameworks for new identifiers, for instance:

...

  • Mobile Driving Licenses;

...

  • Delegation in the context of ID;

...

  • eID and authentication services to support, for instance student mobility and access to educational services, thin file individuals, disabled users, refugees, non-digital natives, lost identities due to natural disasters etc.

...

  • projects which bridge the gap between technological enhancements on one side and their actual uptake by non-expert users of the internet on the other side
  • With a view to next generation certificates, how can European grid certificate authorities build up user-friendly mechanisms that promote a changed user experience and awareness and addresses forms of identity that comply with EU law and or meet specific European needs.


  1. The application of artificial intelligence/machine learning/neural networks to serve the user’s interests.
  • User-centric design, simplicity, usability, edge AI (‘artificial intelligence’)
  • Taking into account the recommendations of the EU High Level Expert Group on AI, a scientific and empirical approach is needed, such as developing guidance on how to approach access and acquisition of data for the development/expansion of AI, operationalize those recommendations in order to strengthen the capacity/ability of the Internet industry in Europe.
  • Explainable artificial intelligence (XAI) for improving human trust in artificial intelligence (AI) systems
  • Quantum resistant computing
  1. Bootstrapping trust at the protocol level, to maintain a trustable Internet Infrastructure.
  • DNS-based security of the Internet Infrastructure (DNSSEC, DOH approach), given the need to reinforce trust in a world of “deep fake”. 
  • Solutions that enable the user to more easily and uniformly set preferences or terms such as machine-readable privacy terms (IEEE - P7012) and technologies that help to reduce the risk that GDPR is misused to further exploit/ complicate the user experience. 
    Services and technologies that enhance transparency, user intervenability, and accountability in data processing.

The call is open to individuals or organisations, or groupings thereof.

...

Support and further information:

The NGI_TRUST consortium will organise a number of webinars and be present at a number of events during the period October-November 2019 to discuss with interested applicants.  Please take a look at: NGI Trust Webinar for potential applicants for information about the second call online open day.

Please check for further information published on the NGI_TRUST open call wiki pages & follow our twitter account: https://twitter.com/NgiTrust if you would like to register for one of these sessions.

For further information or if you have any question, please contact the NGI_TRUST support team: NGI-Trust-support@lists.geant.org

...