Skip to main content

Transitive Trust in Mobile Scenarios

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3995))

Abstract

Horizontal integration of access technologies to networks and services should be accompanied by some kind of convergence of authentication technologies. The missing link for the federation of user identities across the technological boundaries separating authentication methods can be provided by trusted computing platforms. The concept of establishing transitive trust by trusted computing enables the desired cross-domain authentication functionality. The focus of target application scenarios lies in the realm of mobile networks and devices.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. KPMG:Consumers and Convergence - Challenges and opportunities in meeting next generation customer need (2006), http://www.kpmg.de/about/press_office/13611.htm

  2. Marhöfer, M., Schmidt, A.U.: Trusted Integration of Mobile Platforms into Service-oriented Networks. In: Contribution to the 11th German-Japanese Symposium “Security, Privacy and Safety in the Information Society” of the Mnchner Kreis, Tokio, Japan, September 13th-16th (2005)

    Google Scholar 

  3. Li, F., Whalley, J.: Deconstruction of the telecommunications industry: from value chains to value networks. Telecommunications Policy 26, 451–472 (2002)

    Article  Google Scholar 

  4. Ulset, S.: Mobile virtual network operators: a strategic transaction cost analysis of preliminary experiences. Telecommunications Policy 26, 537–549 (2002)

    Article  Google Scholar 

  5. Clauß, S., Köhntopp, M.: Identity management and its support of multilateral security. Computer Networks 37, 205–219 (2001)

    Article  Google Scholar 

  6. Rannenberg, K.: Identity management in mobile cellular networks and related applications. Information Security Technical Report 9, 77–85 (2004)

    Google Scholar 

  7. Lopez, J., Oppliger, R., Pernul, G.: Authentication and authorization infrastructures (AAIs): a comparative survey. Computers & Security 23, 578–590 (2004)

    Article  Google Scholar 

  8. Jsang, A., Gray, E., Kinateder, M.: Simplification and Analysis of Transitive Trust Networks. Web Intelligence and Agent Systems (to appear), http://security.dstc.edu.au/papers/JGK2005-WIAS.pdf

  9. Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: theory and practice. ACM Transactions on Computer Systems (TOCS) 10, 265–310 (1992)

    Article  Google Scholar 

  10. Maurer, U.: Modelling a Public-Key Infrastructure. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 325–350. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  11. Trusted Computing Group: TPM Specification Version 1.2 Revision 85 (February 2005), http://www.trustedcomputinggroup.org

  12. Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Proc. 10th ACM Conference on Computer and Communications Security, Washington DC, ACM Press, New York (2004)

    Google Scholar 

  13. Camenisch, J.L.: Better Privacy for Trusted Computing Platforms. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 73–88. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  14. Bruschi, D., Cavallaro, L., Lanzi, A., Monga, M.: Attacking a Trusted Computing Platform. Improving the Security of the TCG Specification. Technical Report RT 05-05, Dipartimento di Informatica e Comunicazione, Universitïdegli Studi di Milano, Italy (2005)

    Google Scholar 

  15. Cheney, P.: How a terror group cloned Ted Rogers’ cellphone.The Globe and Mail, Toronto, Canada, December 17 (2005)

    Google Scholar 

  16. NTT DoCoMo, IBM, Intel Corporation: Trusted Mobile Platform Protocol Specification Document — Revision 1.00. 04/05/2004, http://www.trusted-mobile.org

  17. Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory 22, 644–654 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  18. Schmidt, A.: Incentive Systems in Multi-Level Markets for Virtual Goods. In: [23], pp. 134–141

    Google Scholar 

  19. Schmucker, M., Ebinger, P.: Alternative Distribution Models based on P2P. In: [23], pp. 142–149

    Google Scholar 

  20. Rajasekaran, H.: An Incentive Based Distribution System for DRM Protected Content Using Peer-to-Peer Networks. In: [23], pp. 150–156

    Google Scholar 

  21. Khare, R., Rifkin, A.: Weaving a web of trust. World Wide Web Journal 2, 77–112 (1997)

    Google Scholar 

  22. Zimmermann, P.: The PGP user’s guide, the International PGP Home Page (October 1994), www.pgpi.org

  23. Nesi, P., Ng, K., Delgado, J. (eds.): Axmedis 2005, Proceedings of the 1st International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution, Volume for Workshops, Industrial, and Application Sessions. Firenze University Press (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kuntze, N., Schmidt, A.U. (2006). Transitive Trust in Mobile Scenarios. In: Müller, G. (eds) Emerging Trends in Information and Communication Security. ETRICS 2006. Lecture Notes in Computer Science, vol 3995. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11766155_6

Download citation

  • DOI: https://doi.org/10.1007/11766155_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34640-1

  • Online ISBN: 978-3-540-34642-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics