...
- Better management of consent, to give more control to the user of their data when accessing and using services.
- Technical innovation in privacy enhancing technologies, such as cryptography, federated identity, security and privacy for IoT, privacy-enhancing data transports and data at rest.
- The application of artificial intelligence/machine learning/neural networks to serve the user’s interests.
- Bootstrapping trust at the protocol level, to maintain a trustable Internet Infrastructure.
An indicative list of possible areas of concern/opportunities (specific topics) is provided below:
...
Topics focused on App implementations to manage the plethora of Information Sharing Agreements and consents that a person would agree to, manage and re-use over time (Type 2 or Type 3 proposals only)
- Solutions enabling users to get trust on privacy terms
- Solutions enabling users to more easily and uniformly set preferences or terms such as machine-readable privacy terms (IEEE - P7012) and technologies that help to reduce the risk that GDPR is misused to further exploit/ complicate the user experience.
- Efficient techniques to anonymize personal data in the era of Big Data.
- Technical innovation in privacy enhancing technologies, such as cryptography, federated identity, security and privacy for IoT, privacy-enhancing data transports and data at rest.
- Simplified multifactor authentication
- Option for encrypted devices/data at rest. i.e. an option for the user to prevent being forced to decrypt their data under, such as physical threat.
- Cybersecurity certification for ICT products, processes and services in the EU (EU Cybersecurity Act).
- Solutions that improve algorithm agility (where deployed algorithms are superseded and must be replaced).
- Improved information for users about the security mechanisms in use by apps (browsers give the user some clues about e.g. TLS; apps give none)
...
- .
- Pilot implementation of specifications, standards, acceptance criteria and measurement frameworks for new identifiers, for instance:
...
- Mobile Driving Licenses;
...
- Delegation in the context of ID;
...
- eID and authentication services to support, for instance student mobility and access to educational services, thin file individuals, disabled users, refugees, non-digital natives, lost identities due to natural disasters etc.
...
- projects which bridge the gap between technological enhancements on one side and their actual uptake by non-expert users of the internet on the other side
- With a view to next generation certificates, how can European grid certificate authorities build up user-friendly mechanisms that promote a changed user experience and awareness and addresses forms of identity that comply with EU law and or meet specific European needs.
- The application of artificial intelligence/machine learning/neural networks to serve the user’s interests.
- User-centric design, simplicity, usability, edge AI (‘artificial intelligence’)
- Taking into account the recommendations of the EU High Level Expert Group on AI, a scientific and empirical approach is needed, such as developing guidance on how to approach access and acquisition of data for the development/expansion of AI, operationalize those recommendations in order to strengthen the capacity/ability of the Internet industry in Europe.
- Explainable artificial intelligence (XAI) for improving human trust in artificial intelligence (AI) systems
- Quantum resistant computing
- Bootstrapping trust at the protocol level, to maintain a trustable Internet Infrastructure.
- DNS-based security of the Internet Infrastructure (DNSSEC, DOH approach), given the need to reinforce trust in a world of “deep fake”.
- Solutions that enable the user to more easily and uniformly set preferences or terms such as machine-readable privacy terms (IEEE - P7012) and technologies that help to reduce the risk that GDPR is misused to further exploit/ complicate the user experience.
- Services and technologies that enhance transparency, user intervenability, and accountability in data processing.
The call is open to individuals or organisations, or groupings thereof.
...
Support and further information:
The NGI_TRUST consortium will organise a number of webinars and be present at a number of events during the period October-November 2019 to discuss with interested applicants. Please take a look at: NGI Trust Webinar for potential applicants for information about the second call online open day.
Please check for further information published on the NGI_TRUST open call wiki pages & follow our twitter account: https://twitter.com/NgiTrust if you would like to register for one of these sessions.
For further information or if you have any question, please contact the NGI_TRUST support team: NGI-Trust-support@lists.geant.org
...