Identity credential issuance with trusted computing
In a client-server environment that deals with multiple clients,there is a need to provide a mechanism on the server to manage the issuance of the client credentials for security authorization. Credentials created using a particular own platform identities and functions as an authentication credent...
Saved in:
Main Authors: | , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2009
|
Subjects: | |
Online Access: | http://repo.uum.edu.my/13459/1/PID13.pdf http://repo.uum.edu.my/13459/ http://www.icoci.cms.net.my |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Utara Malaysia |
Language: | English |
id |
my.uum.repo.13459 |
---|---|
record_format |
eprints |
spelling |
my.uum.repo.134592015-03-31T09:15:30Z http://repo.uum.edu.my/13459/ Identity credential issuance with trusted computing Abd Aziz, Norazah Mazalan, Lucyantie QA75 Electronic computers. Computer science In a client-server environment that deals with multiple clients,there is a need to provide a mechanism on the server to manage the issuance of the client credentials for security authorization. Credentials created using a particular own platform identities and functions as an authentication credentials to authenticate the platform itself in a network communication.However, these credentials can easily be shared, copied and stolen.This will led to an anonymous service sharing and worst to come when the stolen credentials is using for phishing attacks to the original user.One solution to the problem is to use tamper-resistant hardware to which a credential is bound such that a credential can only be generated and used in connection with the hardware.For that, manufacturers have started to embed into computers a tamper resistant piece of hardware, called trusted platform modules(TPM), as specified by the Trusted Computing Group.This mechanism insures that credentials can only be issued with the TPM existence in the platform thus guarantees the platform origins.This paper describes the component involved in the credential issuance method by the server trusted computing domain.To implement our approach, a client server application is used as an interface through the secure communication channel in credential request.The server acts as a Trusted Third Party to verify authorized users in this environment. 2009-06-24 Conference or Workshop Item PeerReviewed application/pdf en http://repo.uum.edu.my/13459/1/PID13.pdf Abd Aziz, Norazah and Mazalan, Lucyantie (2009) Identity credential issuance with trusted computing. In: International Conference on Computing and Informatics 2009 (ICOCI09), 24-25 June 2009, Legend Hotel, Kuala Lumpur. http://www.icoci.cms.net.my |
institution |
Universiti Utara Malaysia |
building |
UUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Utara Malaysia |
content_source |
UUM Institutionali Repository |
url_provider |
http://repo.uum.edu.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Abd Aziz, Norazah Mazalan, Lucyantie Identity credential issuance with trusted computing |
description |
In a client-server environment that deals with multiple clients,there is a need to provide a mechanism on the server to manage the issuance of the client credentials for security authorization. Credentials created using a particular own
platform identities and functions as an authentication credentials to authenticate the platform itself in a network communication.However, these credentials can easily be shared, copied and stolen.This will led to an anonymous service sharing and worst to come when the stolen credentials is using for phishing attacks to the original user.One solution
to the problem is to use tamper-resistant hardware to which a credential is bound such that a credential can only be generated and used in connection with the hardware.For that, manufacturers have started to embed into computers a tamper resistant piece of hardware, called trusted platform modules(TPM), as specified by the Trusted Computing Group.This mechanism insures that credentials can only be issued with the TPM existence in the platform thus guarantees the platform origins.This paper describes the component involved in the credential issuance method by the server trusted computing domain.To implement our approach, a client server application is used as an interface through the secure communication channel in credential request.The server acts as a Trusted Third Party to verify authorized users in this environment. |
format |
Conference or Workshop Item |
author |
Abd Aziz, Norazah Mazalan, Lucyantie |
author_facet |
Abd Aziz, Norazah Mazalan, Lucyantie |
author_sort |
Abd Aziz, Norazah |
title |
Identity credential issuance with trusted computing |
title_short |
Identity credential issuance with trusted computing |
title_full |
Identity credential issuance with trusted computing |
title_fullStr |
Identity credential issuance with trusted computing |
title_full_unstemmed |
Identity credential issuance with trusted computing |
title_sort |
identity credential issuance with trusted computing |
publishDate |
2009 |
url |
http://repo.uum.edu.my/13459/1/PID13.pdf http://repo.uum.edu.my/13459/ http://www.icoci.cms.net.my |
_version_ |
1644281190166822912 |