Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management
Trusted Computing beyond the TCG Specifications
As explained in chapter 3, Trusted Computing comprises a set of functionalities and mechanisms based on which a system can be regarded as “trusted”. The TCG aims at defining a set of specifications related to the TPM, which is crucial for providing the Trusted Computing features on a platform. However, some important Trusted Computing concepts are not directly addressed by the TCG specifications. In fact, many scientists argue that adding a TPM to a platform with an unmodified mainstream operating system does not introduce a considerable improvement to the security of the system.
Suitable operating systems support for TCG specifications seems to be necessary. Process isolation and secure input/output paths between applications and users are examples of important features that need to be provided by the system in order for the Trusted Computing TPM functionalities to be efficient. For this reason, security kernels able to run several environments in parallel – based on virtualization – are being considered to provide such features. More over, manufacturers are introducing security enhancements to their CPUs, input and output devices to provide such environments isolation on a same platform.
In the following, we give an overview of the different efforts for providing operating systems and hardware support for the TCG specifications.
12 / 38 |