User authentication with smart cards in trusted computing architecture

被引:0
|
作者
George, P
机构
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The introduction of smart cards into trusted architectures establishes a clear-cut separation between the roles and responsibilities of both platform and user. On one hand, the Trusted Platform Module (TPM) ensures the platform trustworthiness and secures platform credentials and secrets, while smart cards guarantee user identity and protect user credentials and access authorization. Starting from the identification of the specific roles played by TPM and smart cards in a trust relationship, this paper demonstrates their complementarities and establishes the smart card value proposition for trusted computing infrastructure. Focusing on user authentication we discuss different mechanisms integrating the smart card into TPM authorization protocols in order to implement smart card-based user access control to TPM-protected resources.
引用
收藏
页码:25 / 31
页数:7
相关论文
共 50 条
  • [21] A new secure remote user authentication scheme with smart cards
    Kumar, Manoj
    International Journal of Network Security, 2010, 11 (02) : 88 - 93
  • [22] An Efficient User Authentication Scheme with Smart Cards for Wireless Communications
    Jeon, Woongryul
    Lee, Yunho
    Won, Dongho
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (04): : 1 - 15
  • [23] An Improvement on Remote User Authentication Schemes Using Smart Cards
    Chen, Chin-Ling
    Deng, Yong-Yuan
    Tang, Yung-Wen
    Chen, Jung-Hsuan
    Lin, Yu-Fan
    COMPUTERS, 2018, 7 (01)
  • [24] New remote user authentication scheme using smart cards
    Kumar, M
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 597 - 600
  • [25] Robust smart-cards-based user authentication scheme with user anonymity
    Wu, Shuhua
    Zhu, Yuefei
    Pu, Qiong
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (02) : 236 - 248
  • [26] Further cryptanalysis of 'A user friendly remote user authentication scheme with smart cards'
    Khan, Muhammad Khurram
    ICIET 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND EMERGING TECHNOLOGIES, 2007, : 101 - 105
  • [27] A modified remote user authentication scheme using smart cards
    Shen, JJ
    Lin, CW
    Hwang, MS
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2003, 49 (02) : 414 - 416
  • [28] Cryptanalysis of a remote user authentication scheme using smart cards
    Huang Kai
    Ou Qingyu
    Wu Xiaoping
    Song Yexin
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4490 - 4493
  • [30] An efficient user authentication scheme with smart cards for wireless communications
    Won, D. (dhwon@security.re.kr), 1600, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Australia (07):