Trusted ticket systems and applications

18Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.

Abstract

Trusted Computing is a security base technology that will perhaps be ubiquitous in a few years in personal computers and mobile devices alike. Despite its neutrality with respect to applications, it has raised some privacy concerns. We show that trusted computing can be applied for service access control in a manner protecting users' privacy. We construct a ticket system, a concept at the heart of Identity Management, relying solely on the capabilities of the trusted platform module and the Trusted Computing Group's standards. Two examples show how it can be used for pseudonymous, protected service access. © 2007 International Federation for Information Processing.

Cite

CITATION STYLE

APA

Kuntze, N., & Schmidt, A. U. (2007). Trusted ticket systems and applications. In IFIP International Federation for Information Processing (Vol. 232, pp. 49–60). https://doi.org/10.1007/978-0-387-72367-9_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free