Abstract
Device identifiers can be used to enhance authentication mechanisms for conducting online business. However, personal computers (PC) today are not equipped with standardized, privacy-aware hardware-based device identifiers for general use. This paper describes the implementation of privacy-aware device identifiers using the capabilities of the Trusted Platform Module (TPM) and extending the trust boundary of the device using a Web Service. It also describes a case study based on a device reputation service.
Chapter PDF
Similar content being viewed by others
References
Trusted computing group software stack (2010), http://www.trustedcomputinggroup.org/developers/software_stack
Trusted platform module (2010), http://www.trustedcomputinggroup.org/developers/trusted_platform_module
Xml digital signature (2010), http://www.xml.com/pub/a/2001/08/08/xmldsig.html
Balfe, S., Lakhani, A.D., Paterson, K.G.: Trusted computing: Providing security for peer-to-peer networks. In: IEEE International Conference on Peer-to-Peer Computing, pp. 117–124 (2005)
CyberSource: 2010 fraud report (2010), http://www.cybersource.com/cgi-bin/resource_center/resources.cgi
McFadden, T.: Tpm matrix (2006), http://www.tonymcfadden.net/tpmvendors_arc.html
Ahamad, M., et al: Emerging cyber threats report for 2009 (2008), http://www.gtisc.gatech.edu/pdf/CyberThreatsReport2009.pdf
Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM 21(12), 993–999 (1978)
O’Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication. Proceedings of the IEEE 91(12), 2021–2040 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
da Cruz Pinto, M., Morin, R., Torino, M.E., Varner, D. (2010). Privacy-Aware Device Identifier through a Trusted Web Service. In: Maglio, P.P., Weske, M., Yang, J., Fantinato, M. (eds) Service-Oriented Computing. ICSOC 2010. Lecture Notes in Computer Science, vol 6470. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17358-5_51
Download citation
DOI: https://doi.org/10.1007/978-3-642-17358-5_51
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17357-8
Online ISBN: 978-3-642-17358-5
eBook Packages: Computer ScienceComputer Science (R0)