Abstract Trusted Computing is a security technology which enables the es-tablishment of trust between multiple parties. Previous work showed that Trusted Computing technology can be used to build tickets, a core concept of Identity Management Systems. Relying solely on the Trusted Platform Mod-ule we will demonstrate how this technology can be used in the context of Kerberos for an implementation variant of Identity Management.
Hardware-based trusted computing platforms are intended to overcome many of the problems of trust th...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
Trusted Computing is a security base technology that will perhaps be ubiquitous in a few years in pe...
The establishment of trust relationships across multiple identifier domains in identity management a...
The establishment of trust relationships across multiple identifier domains in identity management a...
In the context of identity management, a major research topic is the establishment of trust relation...
This thesis explores how hardware security technologies can be applied to satisfy the diverse set of...
Abstract. Over the past years, many different approaches and con-cepts in order to increase computer...
Abstract. Over the past years, many different approaches and con-cepts in order to increase computer...
The Trusted Computing Base (TCB) describes the part of an IT system that is responsible for enforcin...
Single-user electronic ticketing systems are widely utilized in several industries, such as transpor...
Concern about vulnerabilities of IT systems is growing together with attention to risks of intrusive...
UnrestrictedAs computer systems become decentralized, grow larger, and cross administrative boundari...
This thesis is divided into two distinct parts. The first part of the thesis explores the role Trust...
Hardware-based trusted computing platforms are intended to overcome many of the problems of trust th...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
Trusted Computing is a security base technology that will perhaps be ubiquitous in a few years in pe...
The establishment of trust relationships across multiple identifier domains in identity management a...
The establishment of trust relationships across multiple identifier domains in identity management a...
In the context of identity management, a major research topic is the establishment of trust relation...
This thesis explores how hardware security technologies can be applied to satisfy the diverse set of...
Abstract. Over the past years, many different approaches and con-cepts in order to increase computer...
Abstract. Over the past years, many different approaches and con-cepts in order to increase computer...
The Trusted Computing Base (TCB) describes the part of an IT system that is responsible for enforcin...
Single-user electronic ticketing systems are widely utilized in several industries, such as transpor...
Concern about vulnerabilities of IT systems is growing together with attention to risks of intrusive...
UnrestrictedAs computer systems become decentralized, grow larger, and cross administrative boundari...
This thesis is divided into two distinct parts. The first part of the thesis explores the role Trust...
Hardware-based trusted computing platforms are intended to overcome many of the problems of trust th...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...