Trusted Infrastructures for Identities

نویسندگان

  • Barbara Fichtinger
  • Eckehard Hermann
  • Nicolai Kuntze
  • Andreas U. Schmidt
چکیده

The establishment of trust relationships across multiple identifier domains in identity management architectures enables a service provider in a certain domain to trust the decisions of an identity provider located in a foreign identifier domain. As a result, users do not have to create new credentials for every identifier domain they communicate with. This trust relationship can be established by using the infrastructure provided by the Trusted Computing Group. In this paper, a concept for the establishment of this trust relationship based on trusted computing technology is developed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure cloud computing with skidentity: A cloud-teamroom for the automotive industry

A major security-challenge in the automotive industry is to enable the secure and flexible engineering cooperation with changing partners in complex development projects. Therefore an effective interorganizational identity management is needed to control access to cooperative development platforms. This identity management has to be based on reliable identification of engineers of various partn...

متن کامل

Secure Communication Using Electronic Identity Cards for Voice over IP Communication, Home Energy Management, and eMobility

Using communication services is a common part of everyday life in a personal or business context. Communication services include Internet services like voice services, chat service, and web 2.0 technologies (wikis, blogs, etc), but other usage areas like home energy management and eMobility are will be increasingly tackled. Such communication services typically authenticate participants. For th...

متن کامل

On Using TPM for Secure Identities in Future Home Networks

Security should be integrated into future networks from the beginning, not as an extension. Secure identities and authentication schemes are an important step to fulfill this quest. In this article, we argue that home networks are a natural trust anchor for such schemes. We describe our concept of home networks as a universal point of reference for authentication, trust and access control, and ...

متن کامل

Re: Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace

1. Will the process and outcome be seen as publicly legitimate? The envisioned identity ecosystem will affect many people in many ways, but the “steering” process will have questionable legitimacy unless it is open and genuinely representative of users’ interests. More generally, we question whether any putatively representative stakeholder process can be perceived as publicly legitimate in the...

متن کامل

The Trust Problem in Modern Network Infrastructures

SDN and NFV are modern techniques to implement networking infrastructures and can be used also to implement other advanced functionalities, such as the protection architecture designed by the SECURED project. This paper discusses a couple of techniques – trustworthy network infrastructure monitoring and remote attestation of virtual machines – useful towards a trusted and secure usage of SDN an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007