Securely storing and using credentials is critical for ensuring the security of many modern distributed applications. Dedicated hardware tokens provide high levels of security, but they are expensive, which makes them unattractive for most service providers. A new approach to address the problem has become possible due to the fact that several types of general-purpose secure hardware are becoming widely deployed. These platforms enable, to different degrees, a strongly isolated secure environment. In this paper, we describe how we use general-purpose secure hardware to develop an architecture for credentials which we call On-board Credentials (ObCs). ObCs combine the flexibility of virtual credentials with the higher levels of protection du...
Many corporations, private organizations, and government agencies maintain sensitive data that must ...
Attribute-based credentials systems offer a privacy-friendly solution to access electronic services....
In a client-server environment that deals with multiple clients,there is a need to provide a mechani...
Securely storing and using credentials is critical for ensuring the security of many modern distribu...
Securely storing and using credentials is critical for ensuring the security of many modern distribu...
A new inexpensive approach for using credentials in a secure manner has become available due to the ...
Secure storage of personal authentication credentials is a long standing problem in computer securit...
Traditional credential solutions have well-known drawbacks. Purely software-based credentials are vu...
Open authentication protocols have become a standard solution to allow interfacing of third-party ap...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
This thesis explores how hardware security technologies can be applied to satisfy the diverse set of...
The amount of sensitive information stored in different online services is rapidly growing in tradit...
Nearly every smartphone, and even some feature phones, today contains a hardware-based trusted execu...
Modern computer systems permit users to access protected information from remote locations. In certa...
Most Web and other on-line service providers (”Inter- net Services”) only support legacy ID (or emai...
Many corporations, private organizations, and government agencies maintain sensitive data that must ...
Attribute-based credentials systems offer a privacy-friendly solution to access electronic services....
In a client-server environment that deals with multiple clients,there is a need to provide a mechani...
Securely storing and using credentials is critical for ensuring the security of many modern distribu...
Securely storing and using credentials is critical for ensuring the security of many modern distribu...
A new inexpensive approach for using credentials in a secure manner has become available due to the ...
Secure storage of personal authentication credentials is a long standing problem in computer securit...
Traditional credential solutions have well-known drawbacks. Purely software-based credentials are vu...
Open authentication protocols have become a standard solution to allow interfacing of third-party ap...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
This thesis explores how hardware security technologies can be applied to satisfy the diverse set of...
The amount of sensitive information stored in different online services is rapidly growing in tradit...
Nearly every smartphone, and even some feature phones, today contains a hardware-based trusted execu...
Modern computer systems permit users to access protected information from remote locations. In certa...
Most Web and other on-line service providers (”Inter- net Services”) only support legacy ID (or emai...
Many corporations, private organizations, and government agencies maintain sensitive data that must ...
Attribute-based credentials systems offer a privacy-friendly solution to access electronic services....
In a client-server environment that deals with multiple clients,there is a need to provide a mechani...