User authentication with smart cards in trusted computing architecture

被引:0
|
作者
George, P
机构
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The introduction of smart cards into trusted architectures establishes a clear-cut separation between the roles and responsibilities of both platform and user. On one hand, the Trusted Platform Module (TPM) ensures the platform trustworthiness and secures platform credentials and secrets, while smart cards guarantee user identity and protect user credentials and access authorization. Starting from the identification of the specific roles played by TPM and smart cards in a trust relationship, this paper demonstrates their complementarities and establishes the smart card value proposition for trusted computing infrastructure. Focusing on user authentication we discuss different mechanisms integrating the smart card into TPM authorization protocols in order to implement smart card-based user access control to TPM-protected resources.
引用
收藏
页码:25 / 31
页数:7
相关论文
共 50 条
  • [1] Mutual authentication scheme with smart cards and password under trusted computing
    Yang, Li
    Ma, Jian-Feng
    Jiang, Qi
    International Journal of Network Security, 2012, 14 (03) : 156 - 163
  • [2] Trusted mutual authentication scheme with smart cards and passwords
    Yang L.
    Ma J.-F.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2011, 40 (01): : 128 - 133
  • [3] User Authentication Schemes Based on Smart Cards
    Li Zhongxian
    Zhan Banghua and Yang Yixian (Beijing University of Posts and Telecommunications
    The Journal of China Universities of Posts and Telecommunications, 1998, (02) : 57 - 59
  • [4] APPLICABILITY OF SMART CARDS TO NETWORK USER AUTHENTICATION
    KRAJEWSKI, M
    CHIPCHAK, JC
    CHODOROW, DA
    TROSTLE, JT
    COMPUTING SYSTEMS, 1994, 7 (01): : 75 - 89
  • [5] Microprocessor smart cards with fingerprint user authentication
    Sanchez-Reillo, R
    Sanchez-Avila, C
    Mengibar-Pozo, L
    36TH ANNUAL 2002 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2002, : 46 - 49
  • [6] Microprocessor smart cards with fingerprint user authentication
    Sanchez-Reillo, R
    Mengibar-Pozo, L
    Sanchez-Avila, C
    IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2003, 18 (03) : 22 - 24
  • [7] Trusted computing based user authentication for mobile equipment
    Zheng, Yu
    He, Da-Ke
    He, Ming-Xing
    Jisuanji Xuebao/Chinese Journal of Computers, 2006, 29 (08): : 1255 - 1264
  • [8] Weaknesses of a remote user authentication scheme using smart cards for multi-server architecture
    Ku, WC
    Chang, ST
    Chiang, MH
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (08) : 3451 - 3454
  • [9] A User Authentication Scheme Based on Trusted Platform for Cloud Computing
    Mo, Jiaqing
    Hu, Zhongwang
    Lin, Yuhua
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 122 - 130
  • [10] Trusted computing based open environment user authentication model
    Cyber Security Cluster, MIMOS Berhad, Technology Park Malaysia, Kuala Lumpur, Malaysia
    不详
    ICACTE - Int. Conf. Adv. Comput. Theory Eng., Proc., (V6487-V6491):