Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
Identity of Identity.
Interoperability.
Profiling.
Forensic Implications.
HighTechID.
D3.1: Overview on IMS.
D3.2: A study on PKI and biometrics.
D3.3: Study on Mobile Identity Management.
D3.5: Workshop on ID-Documents.
D3.6: Study on ID Documents.
D3.7: A Structured Collection on RFID Literature.
D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
D3.10: Biometrics in identity management.
D3.11: Report on the Maintenance of the IMS Database.
D3.15: Report on the Maintenance of the ISM Database.
D3.17: Identity Management Systems – recent developments.
D12.1: Integrated Workshop on Emerging AmI Technologies.
D12.2: Study on Emerging AmI Technologies.
D12.3: A Holistic Privacy Framework for RFID Applications.
D12.4: Integrated Workshop on Emerging AmI.
D12.5: Use cases and scenarios of emerging technologies.
D12.6: A Study on ICT Implants.
D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
D12.10: Normality Mining: Results from a Tracking Study.
Privacy and legal-social content.
Mobility and Identity.
Other.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management
Introduction
What is this deliverable about?
This deliverable presents a study on Trusted Computing (TC), a key enabling technology that adds substantial new security features, and its possible impact on identity and identity management. It gives a deep look into TC concepts, features and specifications, which are still developed within and beyond the “Trusted Computing Group”, a non-profit organization dedicated for TC specifications that evolved out of the “Trusted Computing Platform Alliance” industry working group.
The deliverable discusses the TCG organization and the specifications it defines. It sheds the light on three main components of the TCG proposal which are the hardware component Trusted Platform Module (TPM), a kind of (protected) pre-BIOS called the Core Root of Trust for Measurement (CRTM), and a support software called TCG Software Stack (TSS).
Moreover, the deliverable discusses TC research and development beyond the TCG specifications. This includes trustworthy operating systems and secure platforms and hardware that are designed and developed nowadays to support the TC specifications. The study also focuses on application scenarios for TC such as distributed policy enforcement, DRM and anonymity services. It also gives an overview of the TC solutions in the market according to TPM Manufacturers, system integrators, industrial and academic open-source projects…
This thorough description of TC concepts, functionalities, specifications and market status is followed by a description of the implications of TC for identity and identity management. Some features and protocols defined by the TCG can have substantial effect on various aspects of identification and can hence enable new business cases. Some functionality can also affect privacy aspects of consumer using TC-based platforms; other can enhance identification depending on the use of TC. The deliverable sheds the light on some TC features that can improve identity management, especially in terms of interoperability and trust establishment.
Readers of this deliverable are assumed to have a fair level of computer science background as it especially focuses on technological advancements that can potentially support identity and identity management, although readers with legal background can also benefit from the legally controversial issues relater to TC, in addition to its privacy implications in the context of identification.
Parts of this deliverable are based on a study to be published by the German Federal Office for Information Security (BSI) [141].
2 / 38 |