Advertisement

Abstract

Horizontal integration of access technologies to networks and services should be accompanied by some kind of convergence of authentication technologies. The missing link for the federation of user identities across the technological boundaries separating authentication methods can be provided by trusted computing platforms. The concept of establishing transitive trust by trusted computing enables the desired cross-domain authentication functionality. The focus of target application scenarios lies in the realm of mobile networks and devices.

Keywords

Mobile Device Trust Platform Module Mobile Scenario Mobile Network Operator Identity Provider 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    KPMG:Consumers and Convergence - Challenges and opportunities in meeting next generation customer need (2006), http://www.kpmg.de/about/press_office/13611.htm
  2. 2.
    Marhöfer, M., Schmidt, A.U.: Trusted Integration of Mobile Platforms into Service-oriented Networks. In: Contribution to the 11th German-Japanese Symposium “Security, Privacy and Safety in the Information Society” of the Mnchner Kreis, Tokio, Japan, September 13th-16th (2005)Google Scholar
  3. 3.
    Li, F., Whalley, J.: Deconstruction of the telecommunications industry: from value chains to value networks. Telecommunications Policy 26, 451–472 (2002)CrossRefGoogle Scholar
  4. 4.
    Ulset, S.: Mobile virtual network operators: a strategic transaction cost analysis of preliminary experiences. Telecommunications Policy 26, 537–549 (2002)CrossRefGoogle Scholar
  5. 5.
    Clauß, S., Köhntopp, M.: Identity management and its support of multilateral security. Computer Networks 37, 205–219 (2001)CrossRefGoogle Scholar
  6. 6.
    Rannenberg, K.: Identity management in mobile cellular networks and related applications. Information Security Technical Report 9, 77–85 (2004)Google Scholar
  7. 7.
    Lopez, J., Oppliger, R., Pernul, G.: Authentication and authorization infrastructures (AAIs): a comparative survey. Computers & Security 23, 578–590 (2004)CrossRefGoogle Scholar
  8. 8.
    Jsang, A., Gray, E., Kinateder, M.: Simplification and Analysis of Transitive Trust Networks. Web Intelligence and Agent Systems (to appear), http://security.dstc.edu.au/papers/JGK2005-WIAS.pdf
  9. 9.
    Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: theory and practice. ACM Transactions on Computer Systems (TOCS) 10, 265–310 (1992)CrossRefGoogle Scholar
  10. 10.
    Maurer, U.: Modelling a Public-Key Infrastructure. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 325–350. Springer, Heidelberg (1996)CrossRefGoogle Scholar
  11. 11.
    Trusted Computing Group: TPM Specification Version 1.2 Revision 85 (February 2005), http://www.trustedcomputinggroup.org
  12. 12.
    Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Proc. 10th ACM Conference on Computer and Communications Security, Washington DC, ACM Press, New York (2004)Google Scholar
  13. 13.
    Camenisch, J.L.: Better Privacy for Trusted Computing Platforms. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 73–88. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  14. 14.
    Bruschi, D., Cavallaro, L., Lanzi, A., Monga, M.: Attacking a Trusted Computing Platform. Improving the Security of the TCG Specification. Technical Report RT 05-05, Dipartimento di Informatica e Comunicazione, Universitïdegli Studi di Milano, Italy (2005)Google Scholar
  15. 15.
    Cheney, P.: How a terror group cloned Ted Rogers’ cellphone.The Globe and Mail, Toronto, Canada, December 17 (2005)Google Scholar
  16. 16.
    NTT DoCoMo, IBM, Intel Corporation: Trusted Mobile Platform Protocol Specification Document — Revision 1.00. 04/05/2004, http://www.trusted-mobile.org
  17. 17.
    Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory 22, 644–654 (1976)MathSciNetCrossRefMATHGoogle Scholar
  18. 18.
    Schmidt, A.: Incentive Systems in Multi-Level Markets for Virtual Goods. In: [23], pp. 134–141Google Scholar
  19. 19.
    Schmucker, M., Ebinger, P.: Alternative Distribution Models based on P2P. In: [23], pp. 142–149Google Scholar
  20. 20.
    Rajasekaran, H.: An Incentive Based Distribution System for DRM Protected Content Using Peer-to-Peer Networks. In: [23], pp. 150–156Google Scholar
  21. 21.
    Khare, R., Rifkin, A.: Weaving a web of trust. World Wide Web Journal 2, 77–112 (1997)Google Scholar
  22. 22.
    Zimmermann, P.: The PGP user’s guide, the International PGP Home Page (October 1994), www.pgpi.org
  23. 23.
    Nesi, P., Ng, K., Delgado, J. (eds.): Axmedis 2005, Proceedings of the 1st International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution, Volume for Workshops, Industrial, and Application Sessions. Firenze University Press (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Nicolai Kuntze
    • 1
  • Andreas U. Schmidt
    • 1
  1. 1.Fraunhofer Institute for Secure Information Technology SITDarmstadtGermany

Personalised recommendations