Trusted Infrastructures for Identities
نویسندگان
چکیده
The establishment of trust relationships across multiple identifier domains in identity management architectures enables a service provider in a certain domain to trust the decisions of an identity provider located in a foreign identifier domain. As a result, users do not have to create new credentials for every identifier domain they communicate with. This trust relationship can be established by using the infrastructure provided by the Trusted Computing Group. In this paper, a concept for the establishment of this trust relationship based on trusted computing technology is developed.
منابع مشابه
Secure cloud computing with skidentity: A cloud-teamroom for the automotive industry
A major security-challenge in the automotive industry is to enable the secure and flexible engineering cooperation with changing partners in complex development projects. Therefore an effective interorganizational identity management is needed to control access to cooperative development platforms. This identity management has to be based on reliable identification of engineers of various partn...
متن کاملSecure Communication Using Electronic Identity Cards for Voice over IP Communication, Home Energy Management, and eMobility
Using communication services is a common part of everyday life in a personal or business context. Communication services include Internet services like voice services, chat service, and web 2.0 technologies (wikis, blogs, etc), but other usage areas like home energy management and eMobility are will be increasingly tackled. Such communication services typically authenticate participants. For th...
متن کاملOn Using TPM for Secure Identities in Future Home Networks
Security should be integrated into future networks from the beginning, not as an extension. Secure identities and authentication schemes are an important step to fulfill this quest. In this article, we argue that home networks are a natural trust anchor for such schemes. We describe our concept of home networks as a universal point of reference for authentication, trust and access control, and ...
متن کاملRe: Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace
1. Will the process and outcome be seen as publicly legitimate? The envisioned identity ecosystem will affect many people in many ways, but the “steering” process will have questionable legitimacy unless it is open and genuinely representative of users’ interests. More generally, we question whether any putatively representative stakeholder process can be perceived as publicly legitimate in the...
متن کاملThe Trust Problem in Modern Network Infrastructures
SDN and NFV are modern techniques to implement networking infrastructures and can be used also to implement other advanced functionalities, such as the protection architecture designed by the SECURED project. This paper discusses a couple of techniques – trustworthy network infrastructure monitoring and remote attestation of virtual machines – useful towards a trusted and secure usage of SDN an...
متن کامل