Identity credential issuance with trusted computing

In a client-server environment that deals with multiple clients,there is a need to provide a mechanism on the server to manage the issuance of the client credentials for security authorization. Credentials created using a particular own platform identities and functions as an authentication credent...

Full description

Saved in:
Bibliographic Details
Main Authors: Abd Aziz, Norazah, Mazalan, Lucyantie
Format: Conference or Workshop Item
Language:English
Published: 2009
Subjects:
Online Access:http://repo.uum.edu.my/13459/1/PID13.pdf
http://repo.uum.edu.my/13459/
http://www.icoci.cms.net.my
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Utara Malaysia
Language: English
id my.uum.repo.13459
record_format eprints
spelling my.uum.repo.134592015-03-31T09:15:30Z http://repo.uum.edu.my/13459/ Identity credential issuance with trusted computing Abd Aziz, Norazah Mazalan, Lucyantie QA75 Electronic computers. Computer science In a client-server environment that deals with multiple clients,there is a need to provide a mechanism on the server to manage the issuance of the client credentials for security authorization. Credentials created using a particular own platform identities and functions as an authentication credentials to authenticate the platform itself in a network communication.However, these credentials can easily be shared, copied and stolen.This will led to an anonymous service sharing and worst to come when the stolen credentials is using for phishing attacks to the original user.One solution to the problem is to use tamper-resistant hardware to which a credential is bound such that a credential can only be generated and used in connection with the hardware.For that, manufacturers have started to embed into computers a tamper resistant piece of hardware, called trusted platform modules(TPM), as specified by the Trusted Computing Group.This mechanism insures that credentials can only be issued with the TPM existence in the platform thus guarantees the platform origins.This paper describes the component involved in the credential issuance method by the server trusted computing domain.To implement our approach, a client server application is used as an interface through the secure communication channel in credential request.The server acts as a Trusted Third Party to verify authorized users in this environment. 2009-06-24 Conference or Workshop Item PeerReviewed application/pdf en http://repo.uum.edu.my/13459/1/PID13.pdf Abd Aziz, Norazah and Mazalan, Lucyantie (2009) Identity credential issuance with trusted computing. In: International Conference on Computing and Informatics 2009 (ICOCI09), 24-25 June 2009, Legend Hotel, Kuala Lumpur. http://www.icoci.cms.net.my
institution Universiti Utara Malaysia
building UUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Utara Malaysia
content_source UUM Institutionali Repository
url_provider http://repo.uum.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Abd Aziz, Norazah
Mazalan, Lucyantie
Identity credential issuance with trusted computing
description In a client-server environment that deals with multiple clients,there is a need to provide a mechanism on the server to manage the issuance of the client credentials for security authorization. Credentials created using a particular own platform identities and functions as an authentication credentials to authenticate the platform itself in a network communication.However, these credentials can easily be shared, copied and stolen.This will led to an anonymous service sharing and worst to come when the stolen credentials is using for phishing attacks to the original user.One solution to the problem is to use tamper-resistant hardware to which a credential is bound such that a credential can only be generated and used in connection with the hardware.For that, manufacturers have started to embed into computers a tamper resistant piece of hardware, called trusted platform modules(TPM), as specified by the Trusted Computing Group.This mechanism insures that credentials can only be issued with the TPM existence in the platform thus guarantees the platform origins.This paper describes the component involved in the credential issuance method by the server trusted computing domain.To implement our approach, a client server application is used as an interface through the secure communication channel in credential request.The server acts as a Trusted Third Party to verify authorized users in this environment.
format Conference or Workshop Item
author Abd Aziz, Norazah
Mazalan, Lucyantie
author_facet Abd Aziz, Norazah
Mazalan, Lucyantie
author_sort Abd Aziz, Norazah
title Identity credential issuance with trusted computing
title_short Identity credential issuance with trusted computing
title_full Identity credential issuance with trusted computing
title_fullStr Identity credential issuance with trusted computing
title_full_unstemmed Identity credential issuance with trusted computing
title_sort identity credential issuance with trusted computing
publishDate 2009
url http://repo.uum.edu.my/13459/1/PID13.pdf
http://repo.uum.edu.my/13459/
http://www.icoci.cms.net.my
_version_ 1644281190166822912