...
Through UMA, which is an user centric Identity management system, a Subject is able to control what information will be revealed for what purpose with which parties. Based on these elements, the following table describes the main factors that we consider relevant to measure the level of trustworthiness for each party involved in the protocol:
items | Factors | Description | Quantitative | Qualitative | Typology |
---|---|---|---|---|---|
TF1 | Level of Assurance |
| 1-4 | - | Technical and |
TF2 | Privacy Impact |
| Low=0, Medium=1, | yes |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|