Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management
Scope and Structure of the Document
The scope of this document spans over the concepts, features and market status of Trusted Computing according to the TCG specifications and to other industrial research and development in this field. It also tackles the social and legal aspects related to TC before shedding the light on the implications of TC infrastructure on identity, identification and identity management systems. Recommendations and best practices follow this analysis.
Chapter 3 gives an overview of the main concepts defined within the TC context and which are at the basis of the distinguished features of TC implementation.
Chapter 4 introduces the Trusted Computing Group and gives a more or less detailed description of the TC functionalities as specified by the TCG, with a focus on three main aspects: the Trusted Platform Module (TPM) specifications, the TCG Software Stack (TSS) specifications and the Trusted Network Connect (TNC) specifications.
Chapter 5 tackles the industrial research and development and academic open source projects in the direction of enhancing and supporting TC beyond the TCG specification. This includes secure operating systems, virtualization technology and further TC hardware.
Chapter 6 mentions the current application scenarios for TC and their existing use cases in addition to prospective scenarios.
Chapter 7 focuses on the social and legal aspects of TC, especially the controversial issues.
Chapter 8 sheds the light on the implications of TC for identity and identity management with regard to enhancing identification, possible consumer privacy violation, and providing anonymity in TC-based infrastructures.
Chapter 9 describes a use case scenario showing a possible application of TC to identity management.
Chapter 10 gives some recommendations and best practices regarding the use of TC for identification and identity management
Chapter 11 presents the conclusions of this study.
4 / 38 |