Provision of trusted identity management using trust credentials

  • Authors:
  • Siani Pearson;Marco Casassa Mont

  • Affiliations:
  • Trusted Systems Laboratory, Hewlett Packard Research Labs, Bristol, UK;Trusted Systems Laboratory, Hewlett Packard Research Labs, Bristol, UK

  • Venue:
  • iTrust'06 Proceedings of the 4th international conference on Trust Management
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

The Trusted Computing Group (TCG) has developed specifications for computing platforms that create a foundation of trust for software processes, based on a small amount of extra hardware [1,2]. Several million commercial desktop and laptop products have been shipped based upon this technology, and there is increasing interest in deploying further products. This paper presents a mechanism for using trusted computing in the context of identity management to deal with the problem of providing migration of identity and confidential information across users' personal systems and multiple enterprise IT back-end systems in a safe and trusted way.