Portable High-Assurance Identity
Diversity of strong authentication mechanisms
authentication methods (public cryptosystems, OTP, biometrics)
Personal Trusted Devices (smart cards, tokens, phones)
authentication protocols
Actively evolving:
Proximity, printed electronics, risk-based
Identity Metasystem requirement - pluggable multi-
credential authentication framework
Usability
Risk
Cost
password