Trust of User Using U-Key on Trusted Platform
暂无分享,去创建一个
Trusted computing based on TPM can be viewed from the following several ways, i.e. trusted on user, trusted on platform, trusted on application and trusted between platforms. Even though trusted on user was mentioned in trusted computing architecture, it does not really address security from a user point of view, as the model is centered on the security of platform. User identification and authentication mechanism, are rather rudiment. Andreas Pashalidis and Chris J. Mitchell proposed a single sign on scheme using trusted platform in 2003, where platform attestation identity key is used as user identity. User identity is bound to his/her trusted platform, which makes it inconvenient to users. Mobility and flexibility are not achieved. Based on the rule of separation of user and platform credentials, trust of user using U-key technology on trusted platform is proposed in this paper. The proposed scheme can simplify the management of user and provide portability and flexibility to users
[1] Han Zhen,et al. Enhancing PC Security with a U-Key , 2006, IEEE Security & Privacy.
[2] Chris J. Mitchell,et al. Single Sign-On Using Trusted Platforms , 2003, ISC.