Abstract
Horizontal integration of access technologies to networks and services should be accompanied by some kind of convergence of authentication technologies. The missing link for the federation of user identities across the technological boundaries separating authentication methods can be provided by trusted computing platforms. The concept of establishing transitive trust by trusted computing enables the desired cross-domain authentication functionality. The focus of target application scenarios lies in the realm of mobile networks and devices.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
KPMG:Consumers and Convergence - Challenges and opportunities in meeting next generation customer need (2006), http://www.kpmg.de/about/press_office/13611.htm
Marhöfer, M., Schmidt, A.U.: Trusted Integration of Mobile Platforms into Service-oriented Networks. In: Contribution to the 11th German-Japanese Symposium “Security, Privacy and Safety in the Information Society” of the Mnchner Kreis, Tokio, Japan, September 13th-16th (2005)
Li, F., Whalley, J.: Deconstruction of the telecommunications industry: from value chains to value networks. Telecommunications Policy 26, 451–472 (2002)
Ulset, S.: Mobile virtual network operators: a strategic transaction cost analysis of preliminary experiences. Telecommunications Policy 26, 537–549 (2002)
Clauß, S., Köhntopp, M.: Identity management and its support of multilateral security. Computer Networks 37, 205–219 (2001)
Rannenberg, K.: Identity management in mobile cellular networks and related applications. Information Security Technical Report 9, 77–85 (2004)
Lopez, J., Oppliger, R., Pernul, G.: Authentication and authorization infrastructures (AAIs): a comparative survey. Computers & Security 23, 578–590 (2004)
Jsang, A., Gray, E., Kinateder, M.: Simplification and Analysis of Transitive Trust Networks. Web Intelligence and Agent Systems (to appear), http://security.dstc.edu.au/papers/JGK2005-WIAS.pdf
Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: theory and practice. ACM Transactions on Computer Systems (TOCS) 10, 265–310 (1992)
Maurer, U.: Modelling a Public-Key Infrastructure. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 325–350. Springer, Heidelberg (1996)
Trusted Computing Group: TPM Specification Version 1.2 Revision 85 (February 2005), http://www.trustedcomputinggroup.org
Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Proc. 10th ACM Conference on Computer and Communications Security, Washington DC, ACM Press, New York (2004)
Camenisch, J.L.: Better Privacy for Trusted Computing Platforms. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 73–88. Springer, Heidelberg (2004)
Bruschi, D., Cavallaro, L., Lanzi, A., Monga, M.: Attacking a Trusted Computing Platform. Improving the Security of the TCG Specification. Technical Report RT 05-05, Dipartimento di Informatica e Comunicazione, Universitïdegli Studi di Milano, Italy (2005)
Cheney, P.: How a terror group cloned Ted Rogers’ cellphone.The Globe and Mail, Toronto, Canada, December 17 (2005)
NTT DoCoMo, IBM, Intel Corporation: Trusted Mobile Platform Protocol Specification Document — Revision 1.00. 04/05/2004, http://www.trusted-mobile.org
Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory 22, 644–654 (1976)
Schmidt, A.: Incentive Systems in Multi-Level Markets for Virtual Goods. In: [23], pp. 134–141
Schmucker, M., Ebinger, P.: Alternative Distribution Models based on P2P. In: [23], pp. 142–149
Rajasekaran, H.: An Incentive Based Distribution System for DRM Protected Content Using Peer-to-Peer Networks. In: [23], pp. 150–156
Khare, R., Rifkin, A.: Weaving a web of trust. World Wide Web Journal 2, 77–112 (1997)
Zimmermann, P.: The PGP user’s guide, the International PGP Home Page (October 1994), www.pgpi.org
Nesi, P., Ng, K., Delgado, J. (eds.): Axmedis 2005, Proceedings of the 1st International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution, Volume for Workshops, Industrial, and Application Sessions. Firenze University Press (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kuntze, N., Schmidt, A.U. (2006). Transitive Trust in Mobile Scenarios. In: Müller, G. (eds) Emerging Trends in Information and Communication Security. ETRICS 2006. Lecture Notes in Computer Science, vol 3995. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11766155_6
Download citation
DOI: https://doi.org/10.1007/11766155_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34640-1
Online ISBN: 978-3-540-34642-5
eBook Packages: Computer ScienceComputer Science (R0)