047e5d241eb56c42.tex
1: \begin{abstract}
2: Horizontal integration of access technologies to networks and services
3: should be accompanied by some kind of convergence 
4: of authentication technologies. 
5: The missing link for the federation of user identities
6: across the technological boundaries separating authentication
7: methods can be provided by trusted computing platforms.
8: The concept of establishing transitive trust by trusted computing
9: enables the desired cross-domain authentication functionality.
10: The focus of target application scenarios lies in the realm of 
11: mobile networks and devices.
12: \end{abstract}
13: