•Identity,
reputation, and indirection services
•Mechanisms
to establish trust relationships
–Person
to person and person to organization
•A
flexible, simple user model for identity
•Stronger
user authentication
–Smart
card, cell phone, biometrics
•Application
identity: signing, reputation