Daonity - Grid security from two levels of virtualization
Information Security Tech. Report
Building Trusted Sub-domain for the Grid with Trusted Computing
Information Security and Cryptology
Implementing an application-specific credential platform using late-launched mobile trusted module
Proceedings of the fifth ACM workshop on Scalable trusted computing
A grid portal model based on security and storage resource proxy
CIS'04 Proceedings of the First international conference on Computational and Information Science
Daonity: an experience on enhancing grid security by trusted computing technology
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
ICCS'05 Proceedings of the 5th international conference on Computational Science - Volume Part I
Proceedings of the 18th ACM symposium on Access control models and technologies
Hi-index | 0.00 |
Public key infrastructures suffer from usability and security problems associated with the request for and secure management of end user credentials. Online credential repositories provide mechanisms to ease these shortcomings but pose attractive targets for attacks due to the accumulation of credentials and the need for remote access to these credentials. Through the extension of an existing credential repository with a cryptographic coprocessor for secure storage of credentials an increase in the security of the service can be achieved. This higher security permits the use of online credential repositories with a wide variety of certificates without violating certification authority regulations. Also, the improved performance afforded by hardware support improves the scalability of a centralized credential storage.