<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>On the road to Bandol &#187; Identities</title>
	<atom:link href="https://javacard.vetilles.com/category/user-centric/identities/feed/" rel="self" type="application/rss+xml" />
	<link>https://javacard.vetilles.com</link>
	<description>A weblog on Java Card, security, and other things personal</description>
	<lastBuildDate>Mon, 18 Aug 2025 06:48:26 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.32</generator>
	<item>
		<title>Chip to Cloud live, day 1: Opening panel on eID in Europe</title>
		<link>https://javacard.vetilles.com/2012/09/19/chip-to-cloud-live-day-1-opening-panel-on-eid-in-europe/</link>
		<comments>https://javacard.vetilles.com/2012/09/19/chip-to-cloud-live-day-1-opening-panel-on-eid-in-europe/#comments</comments>
		<pubDate>Wed, 19 Sep 2012 09:24:41 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Identities]]></category>
		<category><![CDATA[Identity]]></category>
		<category><![CDATA[conference]]></category>
		<category><![CDATA[smart card]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/2012/09/19/chip-to-cloud-live-day-1-opening-panel-on-eid-in-europe/</guid>
		<description><![CDATA[This is the conference formerly known as e-Smart. Apart from changing its name, the conference has also moved from Sophia Antipolis to Nice. No more bike riding from home to conference this year. However, the new setting at Acropolis is really nice, with a lot of room. To celebrate that, I have decide to attend [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>This is the conference formerly known as e-Smart. Apart from changing its name, the conference has also moved from Sophia Antipolis to Nice. No more bike riding from home to conference this year. However, the new setting at Acropolis is really nice, with a lot of room.</p>
<p>To celebrate that, I have decide to attend the opening session this year. We started by an enthusiastic eID spporter from European Union, promising us all regulations and standards ready for 2014, which sounds interesting. After all, there are very interesting deployment in countries like Belgium and Estonia, which could be extended.</p>
<p>Then, we get a panel, with the question below. Speakers are Christian van der Valk, from TrustWeaver, Herrmann Sterzinger, from G&#038;D, Massimo Cappelli, from Global CyberSecurity Center, and Marie Figarella, from Gemalto.</p>
<p>Why has eIAS services not been a success to date?</p>
<ul>
<li>Is it really the case? There haven&#8217;t been failures, there are many services ready to,use, and a lack of recognition, with a common perception that digital signature ismore difficult than it actually is.</li>
<li>Citizen certificates are too expensive, and the use cases are not compelling enough. Thisis changing in some places, like in Austria, where the state pays the citizen certificate.</li>
<li>Market fragmentation and lack of trust and confidence are the two main issues. They may even be linked because the fragmentation does not allow the development of global solutlons, deployed across Europe.</li>
<li>Issues have been legal and societal, not technical. Fragmentation and lacking use case are the most important,</li>
</ul>
<p>How would the new electronic identification and trust services regulation improve on this situation?</p>
<ul>
<li>Moving from directive to regulation is important</li>
<li>Making it global would be good, but also hittin some limits, in particular regarding discrepancies in privacy requirements.</li>
<li>Moving to a regulation will limit fragmentation, the scope will be larger, going beyond signatures to seals, timestamps, and more. Mobility between states will also be greatly improved. Finally, supervision should be improved.</li>
</ul>
<p>What additional key actions would be necessary to make eIAS a success?</p>
<ul>
<li>Sharing identity and authentication between public and private spheres would help. Also,aligning with the global market with help, including private support, like Adobe. Also, the recognition of non-PKI solutions would be required (that sounds interesting)</li>
<li>Moving beyond web authentication is required. Moving to global regulation loses things, such as already deployed eIDs, which do not comply to the new regulation, and also existing standads and existing profiles.</li>
<li>Bureaucratic simplification associated to eIAS would be great help. We are also missing a common framework of expertise, with collaboration between national agencies. Thereisalso a digital and cultural divide, which hurts wide adoption. Finally, including soft identity would increase the use of strong identity, if it can be used in our everyday life.</li>
<li>Associate reliable digital identity with a portable secure elemnt, to allow 2-factor authentication. Build an open and interoperale secure Internet. Privacy by design. Push digital identity on all SIM cards to benefit from NFC</li>
</ul>
<p>Now, that&#8217;s quite interesting. The views from the panelists are quite consistent. The question that puzzles me most is the relationship between national and private identity. I am left wondering what opportunities will be given to private companies and web providers to leverage this eID. Making this happen would be a great boost to eIAS.</p>
<p>I also liked Gemalto&#8217;s analysis and proposals, which was short and to the point, except the last point, of course; mandating SIM-based identity for NFC is ludicrous and pure lobbying, at least because the SIM is not the only way to access NFC.</p>
<p>So, an interesting first panel, although there haven&#8217;t been many suprises and illuminating discussions.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2012/09/19/chip-to-cloud-live-day-1-opening-panel-on-eid-in-europe/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cloud (mis)authentication</title>
		<link>https://javacard.vetilles.com/2012/08/07/cloud-misauthentication/</link>
		<comments>https://javacard.vetilles.com/2012/08/07/cloud-misauthentication/#comments</comments>
		<pubDate>Tue, 07 Aug 2012 10:17:39 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Identities]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[cloud]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=814</guid>
		<description><![CDATA[I just read an amazing and chilling story about cloud authentication and hacking. Some guy just lost a big chunk of his digital life, because cloud authentication is not secure, or maybe even more, because cloud authentication is not enough standardized/regulated/watched. In his case (read the story, I won&#8217;t repeat it here, and it is [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>I just read <a href="http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all/" class="liexternal">an amazing and chilling story</a> about cloud authentication and hacking. Some guy just lost a big chunk of his digital life, because cloud authentication is not secure, or maybe even more, because cloud authentication is not enough standardized/regulated/watched. In his case (read the story, I won&#8217;t repeat it here, and it is definitely worth it), the main flaw comes from the fact that Amazon identifies your credit cards on file by the 4 last digits, and Apple requires these very digits to authenticate an iCloud user.</p>
<p>What? No standard on the digits that may/may not be disclosed? I couldn&#8217;t get the facts from EMV or others (if you know, I am interested), but I noticed that although the digits printed on most of my (French) credit card receipts are the same (9 digits following the pattern xxxx xx00 0000 000x), some of my receipts include the infamous 4 last digits, and an Italian receipt includes the 8 first digits. Just with these few examples, I would say that, either there is no standard about which digits to show/hide, or the standard is not applied anyway. It is not difficult to guess that this is most likely not better on Internet, and not only at Amazon.</p>
<p>On this particular issue, I would blame Apple, because the information they require to grant access to an iCloud account is not sufficient (e-mail, billing address, partial credit card number). In particular, Apple allows you to forget the answers to your security questions, which doesn&#8217;t sound very good.</p>
<p>Mat Honan recommends in his paper to move beyond passwords and to adopt two-factor authentication. This sounds sensible, and I approve this move. However, in the present case, how useful would that be? If a cloud vendor uses two-factor authentication, then there must be a procedure for lost tokens. And this procedure better be good.</p>
<p>Not that it&#8217;s that complicated to design a procedure that works. We can for instance rely on existing infrastructure, like the Post Office. You can request your password to be snailmailed to you in a Certified Letter, which will require in-person delivery at your home or authentication with a government ID at the post office. This works perfectly against hackers, because they are not good at physical actions that require real presence.</p>
<p>However, this has some trade-offs: delay and price. Changing a password online is about free and instantaneous, whereas sending a physical letter has a cost, and it will take at least one day. I am ready to accept this delay and this cost to protect my most important cloud accounts, because I have some understanding of the risks. Not everybody does.</p>
<p>This actually represents an interesting role for two-factor authentication tokens: end-user education. Because they are a physical object, any user will understand that a new one needs to be sent if it is lost or compromised. And although they won&#8217;t be happy, they may/should/will associate the cost and delay associated to the token replacement to the security of their account.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2012/08/07/cloud-misauthentication/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>The government wants us to protect our assets</title>
		<link>https://javacard.vetilles.com/2011/04/06/the-government-wants-us-to-protect-our-assets/</link>
		<comments>https://javacard.vetilles.com/2011/04/06/the-government-wants-us-to-protect-our-assets/#comments</comments>
		<pubDate>Wed, 06 Apr 2011 16:01:18 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Identities]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=724</guid>
		<description><![CDATA[The French government has recently published a law, and some details of the application degree have led to strong reactions from the industry, including a suit by the French association of social online services. The suit is about a recent law that forces sites to retain a lot of information about their users, and to [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>The French government has recently published a law, and some details of the application degree have led to strong reactions from the industry, including <a href="http://www.npr.org/blogs/thetwo-way/2011/04/05/135150354/google-microsoft-challenge-french-over-internet-privacy" class="liexternal">a suit</a> by the French association of social online services. The suit is about a recent law that forces sites to retain a lot of information about their users, and to give it to law enforcement on request, and in some cases without any involvement from a judge.</p>
<p>The best part is about the data you provide when subscribing (you can find a copy of the original decree in <a href="http://lesmoutonsenrages.wordpress.com/2011/03/02/le-gouvernement-pourrait-acceder-a-vos-mots-de-passe/" class="liexternal">this</a> article). Here is a rough translation of this part of the text:</p>
<blockquote><p>
3Â° For persons abovementioned in 1 and 2 of I in the same article, information provided when subscribing a contract by a user, or for creation of an account:<br />
a) The idenfier of the connection, at the moment of the account creation;<br />
b) The first name and last name or the business name;<br />
c) The associated postal addresses;<br />
d) The pseudonyms used;<br />
e) The associated electronic mail addresses or account identifiers;<br />
f) The phone numbers;<br />
g) The password as well as the data allowing to verify and modify it, in their latest up-to-date version ;
</p></blockquote>
<p>All of this is pretty scary, but the last one is the scariest: the government wants my password! This is going to simplify the gathering of evidence for anti-terrorist teams (they are the ones who don&#8217;t require a warrant or any judge order to get the information): they can just login as you and send the incriminating e-mail. This part of the story has been widely discussed on French media, with wide-ranging opposition to the measure, so it is not very interesting.</p>
<p>I would like, however, to point to a sentence that we can found at the very bottom of the decree:</p>
<blockquote><p>
Data mentioned in 3Â° and 4Â° only need to be kept if the persons [sites] usually keep them.
</p></blockquote>
<p>OK. So, they will get any information that I give to Internet sites. However, it should be more difficult for the government to get access our passwords, forat least two possible reasons:</p>
<ul>
<li>Good service providers hash/encrypt passwords. This means that the government will get data that allows them to perform dictionary attacks, but not the passwords directly, because the service providers simply don&#8217;t keep that data as such.</li>
<li>Federated identity doesn&#8217;t use passwords. Nothing in the list mentions authentication tokens or things like that, so this is a good way not to disclose your passwords.</li>
</ul>
<p>This last sentence can therefore be considered as a reminder to be very careful about our authentication methods on Internet. Even if this decree eventually gets repelled and/or modified, you can never be sure that your next government is not going to do something similar. So, here are some reminders:</p>
<ul>
<li>Use good passwords. It is the only way to protect yourself from dictionary attacks.</li>
<li>Use different passwords. Do not use the same passwords on all sites. This is another layer of protection against dictionary attacks, but also an obvious protection once one of your passwords is disclosed and/or compromised.</li>
<li>Use a federated identity provider, like an OpenId service. If possible, use one that is not represented in your country, in order to make sure that your passwords are out of reach of your government.</li>
<li>Use alternative authentication methods. Choicces are difficult, but there are programs that will generate random passwords, manage them for you in a secure manner (that&#8217;s the tough part), and have you authenticate in original ways (n-factor, biometry, <em>etc</em>).</li>
</ul>
<p>All of this is sound advice, and it will also contribute to protecting you against other bad guys.</p>
<p>To conclude, I will make a political comment, which is unusual here: I hate the sentence just above, and I hate to consider my government as one of the &#8220;bad guys&#8221;. I am French, European, and I believe that government should be on our side. However, having a government that promotes the use of Internet for &#8220;freedom fighters&#8221; in oppressed countries and collects passwords from &#8220;terrorists&#8221; at home is a bit scary, as we all know that someone&#8217;s terrorists often are someone else&#8217;s freedom fighters. And, as <a href="http://webmink.com/2011/03/28/links-for-2011-03-28/" class="liexternal">mentioned</a> by Simon Phipps, the U.S. is not doing any better by developing an <a href="http://www.nytimes.com/reuters/2011/03/25/us/politics/politics-us-rights-usa-technology.html?_r=2" class="liexternal">Internet panic button</a> for democracy activists that is probably illegal in the U.S. </p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2011/04/06/the-government-wants-us-to-protect-our-assets/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Live from JavaOne: Identity for Services in the Cloud</title>
		<link>https://javacard.vetilles.com/2010/09/22/live-from-javaone-identity-for-services-in-the-cloud/</link>
		<comments>https://javacard.vetilles.com/2010/09/22/live-from-javaone-identity-for-services-in-the-cloud/#comments</comments>
		<pubDate>Wed, 22 Sep 2010 04:16:33 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Identities]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=617</guid>
		<description><![CDATA[The next talk was about Identity for Services in the Cloud, by Jiandong Guo and Symon Chang. Their focus was to promote their favorite solution, which has been around for a while, and whose objective is to clearly separate authentication from authorization using standards. Their scheme is quite classical: The client gets a SAML token [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>The next talk was about Identity for Services in the Cloud, by <a href="http://blogs.sun.com/trustjdg/" class="liexternal">Jiandong Guo</a> and Symon Chang. Their focus was to promote their favorite solution, which has been around for a while, and whose objective is to clearly separate authentication from authorization using standards. Their scheme is quite classical:</p>
<ul>
<li>The client gets a SAML token from Security Token Service (STS) using WS-Trust protocol.</li>
<li>The client puts the SAML token into the message.</li>
<li>The server verifies SAML token and makes authentication and authorization decision.</li>
</ul>
<p>Of course, the actual authentication occurs in the first step, between the client and the STS. After that, it is all a question of trust between the server and the STS that has generated the SAML token. With this scheme, we can avoid direct authentication between the client and the server.</p>
<p>Nothing really new, but I really liked their explanation, based on a parallel with the JavaOne conference badges. When you arrive to JavaOne, you first go to registration. There, you need to prove your identity by showing an officla ID to the attendant, who will then prepare the badge that grants you access to the conference. In addition, the attendant will add some ribbons that describe your specific attributes. For instance, I have the &#8220;Speaker&#8221; and &#8220;Alumni&#8221; ribbons. These ribbons are attributes that complement your basic identification, and allow you to get authorized in some circumstances. For instance, I can get into the speaker lounge, and I got an alumni jacket.</p>
<p>The conference badge acts like a SAML token: the basic badge shows that you have been authenticated, and the additional attributes describe some of your characteristics. </p>
<p>The model can be slightly enhanced by using two levels of STS. The idea is that the user will get a SAML token from a local STS, and use that token. The server will then get that token to another STS (local to the server), and get in return another SAML token, suited to its needs. With this scheme, both the client and the server only need to trust a single STS. The business of trust is entirely delegated to the two STS&#8217;s, who need to share each other. This clearly separates the trust issues from the rest.</p>
<p>Interesting presentation, but I still don&#8217;t feel enlightened about identity in the cloud. There is another session tomorrow on the topic, I hope that I will be thrilled.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2010/09/22/live-from-javaone-identity-for-services-in-the-cloud/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Here and Now !</title>
		<link>https://javacard.vetilles.com/2010/03/07/here-and-now/</link>
		<comments>https://javacard.vetilles.com/2010/03/07/here-and-now/#comments</comments>
		<pubDate>Sat, 06 Mar 2010 22:21:08 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Discussions]]></category>
		<category><![CDATA[Identities]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[mobile]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=548</guid>
		<description><![CDATA[Ajit Jaokar has published a post on Mobile Cloud Computing, in which he asks some questions about mobile computing. I found his questions very interesting, so here are my answers (I kept them short, but I will try to develop some things later): a) Is &#8216;mobile cloud computing&#8217; a distinct domain in itself? Or is [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><a href="http://opengardensblog.futuretext.com/" class="liexternal">Ajit Jaokar</a> has published a post on <a href="http://opengardensblog.futuretext.com/archives/2010/03/mobile_cloud_co_2.html" class="liexternal">Mobile Cloud Computing</a>, in which he asks some questions about mobile computing. I found his questions very interesting, so here are my answers (I kept them short, but I will try to develop some things later):</p>
<p><strong>a) Is &#8216;mobile cloud computing&#8217; a distinct domain in itself? Or is it more about &#8216;Web Cloud providers going mobile&#8217;</strong><br />
Mobile cloud computing relies on the same principles than standard cloud computing, with one major differences at the client level: Mobile clients a link btween the real world and the virtual world, because they are always connected, and they are with us. The consequence is that our requests are very often about where I am now, what I am doing now, who I am with, and similar things. Basically, mobile cloud comuting is about &#8220;Here and Now&#8221;</p>
<p><strong>b) Do mobile providers have any advantages over web providers (like Amazon)?</strong><br />
Yes, if they take advantage of specific mobile characteristics to actually establish links between the cloud and the world we live in. Things like location and proximity (for instance, the ability to exchange with a neighbor). Otherwise, no advantage.</p>
<p><strong>c) What are the key issues and key advantages for mobile cloud computing?</strong></p>
<ul>
<li><em>Issues</em>: Leveraging the available information. Connectivity Issues (<em>i.e.</em>, local caching) Adequacty of user interaction (quantity, presentation).</li>
<li><em>Advantages</em>: Availabiliy of the user. Link with physical interaction.</li>
</ul>
<p><strong>d) Will mobile cloud computing be about privacy in addition to security?</strong><br />
Privacy is a big issue for cloud computing in general. Adding information like location, proximity of others, or similar information, makes privacy more important, but the principles remain the same.</p>
<p><strong>e) What are the biggest privacy and security threats to mobile cloud computing?</strong><br />
I see two levels of problems: first, we need to define the proper access controls. Cloud computing is can be made more interesting by making some information available to services/ partners/ friends, but both service providers and end users must ensure that the proper access controls are defined.</p>
<p>The second level is to properly enforce these controls. At that level, the easy part (maybe) is to implement software correctly on servers and mobile devices. The hard part is to make all users understand the importance of privacy and access controls.</p>
<p><strong>g) Will providers use Mobile Cloud computing to ask payment for granular features(like access to voicemail) aka the Ryanair business model for Cloud computing!</strong><br />
The Ryanair business model can work for a few crucial services, and possibly in some professional settings, in exchange for a better quality of service.  Micro-payments (or better, <a href="http://cyber.law.harvard.edu/projectvrm/EmanciPay" class="liexternal">micro-accounting</a>), would be far better.</p>
<p><strong>h) Will enterprises be the key drivers for Mobile Cloud Computing?</strong><br />
As users, most likely not. Most enterprise jobs are static, but we all move around in our personal lives. As service providers, it would be nice to see &#8220;classical&#8221; businesses being able to do something.</p>
<p><strong>i) Mobile Cloud computing can be implemented at many levels in the Telecoms stack: The Device/Platform, the Operator; The Mobile Web; Infrastructure; SIM. Any more potential ways in which mobile cloud computing can be implemented? And what are the pros and cons of the approaches?<br />
</strong><br />
This is a crucial question, and I would love to read other people&#8217;s answers, because mine are still confuse at this day. Among the other ways to implement mobile cloud computing, there may be some things to do with small embedded servers (Java Card 3.0 of course, but not only); also, the Device/Platform category may be too vague, because there are several actors there, including the application framework, the Trusted Execution Environment, and more.</p>
<p><strong>j) Which applications would be most likely to benefit from Mobile Cloud Computing?</strong><br />
Most likely not the obvious ones, like mapping or very obvious uses of local information. Combinations of social aspects with location, content sharing are sound to me like winners, but I can&#8217;t really see how.</p>
<p><strong>k) Would PCs/Sub netbooks and other &#8216;non phone&#8217; devices covered by Mobile broadband be impacted by this trend and if so, how?</strong><br />
If they are able to include the information about â€œHere and nowâ€, why not? It&#8217;s not the device that counts, it&#8217;s the connectivity. Other devices, like cameras or MP3 players, could also get involved. If they are connected to the network (directly or indirectly) and if they know about â€œHere and nowâ€, they can do things.</p>
<p><strong>l) Many providers use &#8216;data backup&#8217; as a stepping stone to cloud services. Will these services evolve beyond the &#8216;data backup&#8217; i.e. for instance will customers trust their backup providers with personalized information leading to other services</strong><br />
Data backup is a first step, which could/should/will be reversed. The main copy of the data is in the cloud, and there is a cache on the device. However, it should be possible to protect some information (for instance, by only storing it encrypted in the cloud).</p>
<p>Another question is about the &#8220;ownership&#8221; of the data in the cloud. Users would benefit from having much more data in the cloud, potentially shareable with others. Think about shopping lists, medical files, and much more. Of course, if we consider such sensitive data, then filtering and presentation becomes very important. But then, by giving more data to be correlated in the cloud, we also increase the potential value of services.</p>
<p><strong>j) How important is end to end security for Cloud computing?</strong><br />
End-to-end? Of course, it&#8217;s important. And it basically depends a lot on the data to be protected.</p>
<p><strong>k) How important is the management of the client on diverse devices important for end to end cloud security?</strong><br />
Very important, but not more than for any other kind of mobile application. The data may be in the cloud, but some of it is likely to be cached, making it available through standard vulnerabilities.</p>
<p><strong>l) Is the Mobile Web a good client for Cloud computing?</strong><br />
Is Mobile Web good enough for enforcing access control? Maybe not, unless it is complemented with mobile apps, or with high-level widgets.</p>
<p><strong>m) Will emerging markets adopt Cloud computing services?</strong><br />
Yes, most likely not the same ones. The fact that in many markets, mobile phones are more prevalent than any other high-tech device makes mobile cloud computing a good candidate for a lot of new applications, adapted to the needs of every market, including emerging ones.</p>
<p><strong>n) Will low spec devices (ex feature phones) benefit from &#8216;thin client&#8217; cloud computing services?</strong><br />
Yes. More than the device, is issue is the connectivity offered by the operator. The price of mobile connectivity can be a strong deterrent, but it is likely to go away, in particular if it is restricted to a limited number of cloud services.</p>
<p><strong>o) Identity and the Cloud.</strong><br />
On a mobile device, the username/password model is even more broken than on a PC. So, mobile devices may push strong identities on the cloud. Another important thing is that identity is not only useful between a user and a service provider, but also between two users, before to trust each other.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2010/03/07/here-and-now/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
	</channel>
</rss>
