You are here: Resources > FIDIS Deliverables > HighTechID > D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management > 

D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management

Relevance of TC for Identity and Identity Management  Title:
SCOPE AND STRUCTURE OF THE DOCUMENT
 Trusted Computing – an Overview

 

Scope and Structure of the Document

The scope of this document spans over the concepts, features and market status of Trusted Computing according to the TCG specifications and to other industrial research and development in this field. It also tackles the social and legal aspects related to TC before shedding the light on the implications of TC infrastructure on identity, identification and identity management systems. Recommendations and best practices follow this analysis. 

Chapter 3 gives an overview of the main concepts defined within the TC context and which are at the basis of the distinguished features of TC implementation. 

Chapter 4 introduces the Trusted Computing Group and gives a more or less detailed description of the TC functionalities as specified by the TCG, with a focus on three main aspects: the Trusted Platform Module (TPM) specifications, the TCG Software Stack (TSS) specifications and the Trusted Network Connect (TNC) specifications. 

Chapter 5 tackles the industrial research and development and academic open source projects in the direction of enhancing and supporting TC beyond the TCG specification. This includes secure operating systems, virtualization technology and further TC hardware. 

Chapter 6 mentions the current application scenarios for TC and their existing use cases in addition to prospective scenarios.  

Chapter 7 focuses on the social and legal aspects of TC, especially the controversial issues. 

Chapter 8 sheds the light on the implications of TC for identity and identity management with regard to enhancing identification, possible consumer privacy violation, and providing anonymity in TC-based infrastructures. 

Chapter 9 describes a use case scenario showing a possible application of TC to identity management.  

Chapter 10 gives some recommendations and best practices regarding the use of TC for identification and identity management 

Chapter 11 presents the conclusions of this study. 

 

 

Relevance of TC for Identity and Identity Management  fidis-wp3-del3.9_Study_on_the_Impact_of_Trusted_Computing_on_Identity_and_Identity_Management_v1.1.sxw  Trusted Computing – an Overview
4 / 38