Abstract
Trusted Computing is a security technology which enables the establishment of trust between multiple parties. Previous work showed that Trusted Computing technology can be used to build tickets, a core concept of Identity Management Systems. Relying solely on the Trusted Platform Module we will demonstrate how this technology can be used in the context of Kerberos for an implementation variant of Identity Management.
Chapter PDF
Similar content being viewed by others
Keywords
- Trusted Platform Module
- Authentication Server
- Digital Right Management
- Trust Computing
- Identity Provider
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Kerberos: The Network Authentication Protocol, http://web.mit.edu/Kerberos/
Nanodatacenters / Results / Security Experimentation Environment, http://nanodatacenters.eu/
QEMU, http://bellard.org/qemu/
[Qemu-devel] [PATCH] Add TPM support, http://www.mail-archive.com/qemu-devel@nongnu.org/msg13408.html
Software-based TPM Emulator, http://tpm-emulator.berlios.de/
SourceForge.net: Integrity Measurement Architecture (IMA), http://sourceforge.net/projects/linux-ima
TPM/J Java-based API for the Trusted Platform Module (TPM), http://projects.csail.mit.edu/tc/tpmj/
Gürgens, S., Rudolph, C.: AIK Certification. Technical report, Fraunhofer SIT / BSI. 13 (April 2006) (unpublished)
Trusted Computing Group: Home, https://www.trustedcomputinggroup.org/home
Trusted GRUB, http://trousers.sourceforge.net/grub.html
Fichtinger, B.: Trusted infrastructures for identities. Master’s thesis, Fachhochschule Hagenberg, Austria (May 2007)
Fichtinger, B., Herrmann, E., Kuntze, N., Schmidt, A.U.: Trusted infrastructures for identities. In: Grimm, R., Hass, B. (eds.) Proc. 5th Internat. Workshop Virtual Goods, Koblenz, Hauppauge, New York, October 11-13, 2007. Nova Publishers (2008)
Gasser, M., Goldstein, A., Kaufman, C., Lampson, B.: The Digital Distributed System Security Architecture. In: Proc. 12th NIST-NCSC National Computer Security Conference, pp. 305–319 (1989)
Kuntze, N., Mähler, D., Schmidt, A.U.: Employing Trusted Computing for the forward pricing of pseudonyms in reputation systems. In: Proc. Axmedis 2006, Atti del Convegno, pp. 145–149. Firenze University Press (2006)
Liberty Alliance. Whitepaper: Identity Theft Primer (December 2005)
Neuman, C., Yu, T., Hartman, S., Raeburn, K.: The Kerberos Network Authentication Service (V5). RFC 4120, updated by RFCs 4537, 5021
TCG. TCG TPM Specification Version 1.2 Revision 103. Technical report, tcg (2007), Trusted Computing Group (retrieved February 29, 2008), https://www.trustedcomputinggroup.org/groups/tpm/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 IFIP International Federation for Information Processing
About this paper
Cite this paper
Leicher, A., Kuntze, N., Schmidt, A.U. (2009). Implementation of a Trusted Ticket System. In: Gritzalis, D., Lopez, J. (eds) Emerging Challenges for Security, Privacy and Trust. SEC 2009. IFIP Advances in Information and Communication Technology, vol 297. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01244-0_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-01244-0_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-01243-3
Online ISBN: 978-3-642-01244-0
eBook Packages: Computer ScienceComputer Science (R0)