Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management
Table Of Content
- Introduction
- What is this deliverable about?
- Relevance of TC for Identity and Identity Management
- Scope and Structure of the Document
- Trusted Computing – an Overview
- Trusted Computing Group Specifications
- The Trusted Computing Group
- Trusted Platform Module (TPM) Specification Overview
- TPM Components and Tamper Protection
- TPM Key Types and Credentials
- Integrity Measurement and Reporting
- Binding, Signing, Sealing, Sealed Signing and Attestation
- TCG Software Stack (TSS) Specification Overview
- Trusted Network Connect (TNC) Specification Overview
- Trusted Computing beyond the TCG Specifications
- Operating Systems Support and Secure Platforms
- Supporting Technologies: Virtualization
- Industrial and Academic Open Source Projects
- European Multilaterally Secure Computing Base (EMSCB)
- Open Trusted Computing (Open TC)
- TrouSerS
- Enforcer
- Trusted Linux Client
- tcgLinux
- PERSEUS Architecture and Turaya security kernel
- More Trusted Computing Hardware
- Application Scenarios for Trusted Computing Technology
- Application Areas
- Distributed Policy Enforcement
- Compartmented Mode Security
- Secure End-User Systems
- Embedded Security
- Existing Uses Cases and Future Scenarios
- Controversial and Legal aspects of Trusted Computing
- Trusted Computing, Identity and Identity Management
- Trusted Computing for Identity Management
- Types of Identity Management
- Related Work and Current Problems
- TC use for identification
- TPM credentials storage
- TPM-based authentication policies
- TC platforms identity management
- Business use cases
- TC identity and Consumer Privacy
- TC platforms and Anonymity
- TC and Identity Management – a Use Case Scenario
- Recommendations and Future work
- Trusted Computing Benefits for Identity Management
- Further Research and Identity Management Considerations
- Conclusion
- References
- Annex 1: Glossary