Abstract
Trusted Computing is a security base technology that will perhaps be ubiquitous in a few years in personal computers and mobile devices alike. Despite its neutrality with respect to applications, it has raised some privacy concerns. We show that trusted computing can be applied for service access control in a manner protecting users' privacy. We construct a ticket system, a concept at the heart of Identity Management, relying solely on the capabilities of the trusted platform module and the Trusted Computing Group's standards. Two examples show how it can be used for pseudonymous, protected service access. © 2007 International Federation for Information Processing.
Cite
CITATION STYLE
Kuntze, N., & Schmidt, A. U. (2007). Trusted ticket systems and applications. In IFIP International Federation for Information Processing (Vol. 232, pp. 49–60). https://doi.org/10.1007/978-0-387-72367-9_5
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.