Identity credential issuance with trusted computing

In a client-server environment that deals with multiple clients,there is a need to provide a mechanism on the server to manage the issuance of the client credentials for security authorization. Credentials created using a particular own platform identities and functions as an authentication credent...

Full description

Bibliographic Details
Main Authors: Abd Aziz, Norazah, Mazalan, Lucyantie
Format: Conference or Workshop Item
Language:English
Published: 2009
Subjects:
Online Access:https://repo.uum.edu.my/id/eprint/13459/1/PID13.pdf
_version_ 1825803189553725440
author Abd Aziz, Norazah
Mazalan, Lucyantie
author_facet Abd Aziz, Norazah
Mazalan, Lucyantie
author_sort Abd Aziz, Norazah
collection UUM
description In a client-server environment that deals with multiple clients,there is a need to provide a mechanism on the server to manage the issuance of the client credentials for security authorization. Credentials created using a particular own platform identities and functions as an authentication credentials to authenticate the platform itself in a network communication.However, these credentials can easily be shared, copied and stolen.This will led to an anonymous service sharing and worst to come when the stolen credentials is using for phishing attacks to the original user.One solution to the problem is to use tamper-resistant hardware to which a credential is bound such that a credential can only be generated and used in connection with the hardware.For that, manufacturers have started to embed into computers a tamper resistant piece of hardware, called trusted platform modules(TPM), as specified by the Trusted Computing Group.This mechanism insures that credentials can only be issued with the TPM existence in the platform thus guarantees the platform origins.This paper describes the component involved in the credential issuance method by the server trusted computing domain.To implement our approach, a client server application is used as an interface through the secure communication channel in credential request.The server acts as a Trusted Third Party to verify authorized users in this environment.
first_indexed 2024-07-04T05:52:46Z
format Conference or Workshop Item
id uum-13459
institution Universiti Utara Malaysia
language English
last_indexed 2024-07-04T05:52:46Z
publishDate 2009
record_format eprints
spelling uum-134592015-03-31T09:15:30Z https://repo.uum.edu.my/id/eprint/13459/ Identity credential issuance with trusted computing Abd Aziz, Norazah Mazalan, Lucyantie QA75 Electronic computers. Computer science In a client-server environment that deals with multiple clients,there is a need to provide a mechanism on the server to manage the issuance of the client credentials for security authorization. Credentials created using a particular own platform identities and functions as an authentication credentials to authenticate the platform itself in a network communication.However, these credentials can easily be shared, copied and stolen.This will led to an anonymous service sharing and worst to come when the stolen credentials is using for phishing attacks to the original user.One solution to the problem is to use tamper-resistant hardware to which a credential is bound such that a credential can only be generated and used in connection with the hardware.For that, manufacturers have started to embed into computers a tamper resistant piece of hardware, called trusted platform modules(TPM), as specified by the Trusted Computing Group.This mechanism insures that credentials can only be issued with the TPM existence in the platform thus guarantees the platform origins.This paper describes the component involved in the credential issuance method by the server trusted computing domain.To implement our approach, a client server application is used as an interface through the secure communication channel in credential request.The server acts as a Trusted Third Party to verify authorized users in this environment. 2009-06-24 Conference or Workshop Item PeerReviewed application/pdf en https://repo.uum.edu.my/id/eprint/13459/1/PID13.pdf Abd Aziz, Norazah and Mazalan, Lucyantie (2009) Identity credential issuance with trusted computing. In: International Conference on Computing and Informatics 2009 (ICOCI09), 24-25 June 2009, Legend Hotel, Kuala Lumpur. http://www.icoci.cms.net.my
spellingShingle QA75 Electronic computers. Computer science
Abd Aziz, Norazah
Mazalan, Lucyantie
Identity credential issuance with trusted computing
title Identity credential issuance with trusted computing
title_full Identity credential issuance with trusted computing
title_fullStr Identity credential issuance with trusted computing
title_full_unstemmed Identity credential issuance with trusted computing
title_short Identity credential issuance with trusted computing
title_sort identity credential issuance with trusted computing
topic QA75 Electronic computers. Computer science
url https://repo.uum.edu.my/id/eprint/13459/1/PID13.pdf
work_keys_str_mv AT abdaziznorazah identitycredentialissuancewithtrustedcomputing
AT mazalanlucyantie identitycredentialissuancewithtrustedcomputing