On the Deployment of Mobile Trusted Modules

In its recently published TCG mobile reference architecture, the TCG Mobile Phone Work Group specifies a new concept to enable trust into future mobile devices. For this purpose, the TCG devises a trusted mobile platform as a set of trusted engines on behalf of different stakeholders supported by a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Schmidt, A.U., Kuntze, N., Kasper, M.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 3174
container_issue
container_start_page 3169
container_title
container_volume
creator Schmidt, A.U.
Kuntze, N.
Kasper, M.
description In its recently published TCG mobile reference architecture, the TCG Mobile Phone Work Group specifies a new concept to enable trust into future mobile devices. For this purpose, the TCG devises a trusted mobile platform as a set of trusted engines on behalf of different stakeholders supported by a physical trust-anchor. In this paper, we present our perception on this emerging specification. We propose an approach for the practical design and implementation of this concept and how to deploy it to a trustworthy operating platform. In particular we propose a method for the take-ownership of a device by the user and the migration (i.e., portability) of user credentials between devices.
doi_str_mv 10.1109/WCNC.2008.553
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4489584</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4489584</ieee_id><sourcerecordid>4489584</sourcerecordid><originalsourceid>FETCH-LOGICAL-c219t-dbd5f0a90631c9f4d4f5c335a9dd178433542ad9dfc0fac95666eb2a79e16bcd3</originalsourceid><addsrcrecordid>eNotjDtPwzAUhS0eEm1hZGLxjhJ8bV8nd0ThKRW6FDFWjn0tgtKmStKh_54gmM75dPQdIa5B5QCK7j6r9yrXSpU5ojkRM0AsM-1An4o5WG0tEBX67HfQmBkEuBDzYfhWSiu0diZuVzs5frF84H3bHbe8G2WX5FtXNy3LdX8YRo4TxkPLw6U4T74d-Oo_F-Lj6XFdvWTL1fNrdb_MggYas1hHTMqTcgYCJRttwmAMeooRitJO1WofKaagkg-EzjmutS-IwdUhmoW4-fttmHmz75ut748ba0vCyf4BR2xCSw</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>On the Deployment of Mobile Trusted Modules</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Schmidt, A.U. ; Kuntze, N. ; Kasper, M.</creator><creatorcontrib>Schmidt, A.U. ; Kuntze, N. ; Kasper, M.</creatorcontrib><description>In its recently published TCG mobile reference architecture, the TCG Mobile Phone Work Group specifies a new concept to enable trust into future mobile devices. For this purpose, the TCG devises a trusted mobile platform as a set of trusted engines on behalf of different stakeholders supported by a physical trust-anchor. In this paper, we present our perception on this emerging specification. We propose an approach for the practical design and implementation of this concept and how to deploy it to a trustworthy operating platform. In particular we propose a method for the take-ownership of a device by the user and the migration (i.e., portability) of user credentials between devices.</description><identifier>ISSN: 1525-3511</identifier><identifier>ISBN: 1424419972</identifier><identifier>ISBN: 9781424419975</identifier><identifier>EISSN: 1558-2612</identifier><identifier>DOI: 10.1109/WCNC.2008.553</identifier><language>eng</language><publisher>IEEE</publisher><subject>Abstracts ; Application software ; Communications Society ; Computer architecture ; Engines ; Information technology ; Mobile computing ; Mobile handsets ; Programming ; Security</subject><ispartof>2008 IEEE Wireless Communications and Networking Conference, 2008, p.3169-3174</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c219t-dbd5f0a90631c9f4d4f5c335a9dd178433542ad9dfc0fac95666eb2a79e16bcd3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4489584$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,778,782,787,788,2054,27912,54907</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4489584$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Schmidt, A.U.</creatorcontrib><creatorcontrib>Kuntze, N.</creatorcontrib><creatorcontrib>Kasper, M.</creatorcontrib><title>On the Deployment of Mobile Trusted Modules</title><title>2008 IEEE Wireless Communications and Networking Conference</title><addtitle>WCNC</addtitle><description>In its recently published TCG mobile reference architecture, the TCG Mobile Phone Work Group specifies a new concept to enable trust into future mobile devices. For this purpose, the TCG devises a trusted mobile platform as a set of trusted engines on behalf of different stakeholders supported by a physical trust-anchor. In this paper, we present our perception on this emerging specification. We propose an approach for the practical design and implementation of this concept and how to deploy it to a trustworthy operating platform. In particular we propose a method for the take-ownership of a device by the user and the migration (i.e., portability) of user credentials between devices.</description><subject>Abstracts</subject><subject>Application software</subject><subject>Communications Society</subject><subject>Computer architecture</subject><subject>Engines</subject><subject>Information technology</subject><subject>Mobile computing</subject><subject>Mobile handsets</subject><subject>Programming</subject><subject>Security</subject><issn>1525-3511</issn><issn>1558-2612</issn><isbn>1424419972</isbn><isbn>9781424419975</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjDtPwzAUhS0eEm1hZGLxjhJ8bV8nd0ThKRW6FDFWjn0tgtKmStKh_54gmM75dPQdIa5B5QCK7j6r9yrXSpU5ojkRM0AsM-1An4o5WG0tEBX67HfQmBkEuBDzYfhWSiu0diZuVzs5frF84H3bHbe8G2WX5FtXNy3LdX8YRo4TxkPLw6U4T74d-Oo_F-Lj6XFdvWTL1fNrdb_MggYas1hHTMqTcgYCJRttwmAMeooRitJO1WofKaagkg-EzjmutS-IwdUhmoW4-fttmHmz75ut748ba0vCyf4BR2xCSw</recordid><startdate>200803</startdate><enddate>200803</enddate><creator>Schmidt, A.U.</creator><creator>Kuntze, N.</creator><creator>Kasper, M.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200803</creationdate><title>On the Deployment of Mobile Trusted Modules</title><author>Schmidt, A.U. ; Kuntze, N. ; Kasper, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c219t-dbd5f0a90631c9f4d4f5c335a9dd178433542ad9dfc0fac95666eb2a79e16bcd3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Abstracts</topic><topic>Application software</topic><topic>Communications Society</topic><topic>Computer architecture</topic><topic>Engines</topic><topic>Information technology</topic><topic>Mobile computing</topic><topic>Mobile handsets</topic><topic>Programming</topic><topic>Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Schmidt, A.U.</creatorcontrib><creatorcontrib>Kuntze, N.</creatorcontrib><creatorcontrib>Kasper, M.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Schmidt, A.U.</au><au>Kuntze, N.</au><au>Kasper, M.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>On the Deployment of Mobile Trusted Modules</atitle><btitle>2008 IEEE Wireless Communications and Networking Conference</btitle><stitle>WCNC</stitle><date>2008-03</date><risdate>2008</risdate><spage>3169</spage><epage>3174</epage><pages>3169-3174</pages><issn>1525-3511</issn><eissn>1558-2612</eissn><isbn>1424419972</isbn><isbn>9781424419975</isbn><abstract>In its recently published TCG mobile reference architecture, the TCG Mobile Phone Work Group specifies a new concept to enable trust into future mobile devices. For this purpose, the TCG devises a trusted mobile platform as a set of trusted engines on behalf of different stakeholders supported by a physical trust-anchor. In this paper, we present our perception on this emerging specification. We propose an approach for the practical design and implementation of this concept and how to deploy it to a trustworthy operating platform. In particular we propose a method for the take-ownership of a device by the user and the migration (i.e., portability) of user credentials between devices.</abstract><pub>IEEE</pub><doi>10.1109/WCNC.2008.553</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1525-3511
ispartof 2008 IEEE Wireless Communications and Networking Conference, 2008, p.3169-3174
issn 1525-3511
1558-2612
language eng
recordid cdi_ieee_primary_4489584
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Abstracts
Application software
Communications Society
Computer architecture
Engines
Information technology
Mobile computing
Mobile handsets
Programming
Security
title On the Deployment of Mobile Trusted Modules
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T13%3A01%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=On%20the%20Deployment%20of%20Mobile%20Trusted%20Modules&rft.btitle=2008%20IEEE%20Wireless%20Communications%20and%20Networking%20Conference&rft.au=Schmidt,%20A.U.&rft.date=2008-03&rft.spage=3169&rft.epage=3174&rft.pages=3169-3174&rft.issn=1525-3511&rft.eissn=1558-2612&rft.isbn=1424419972&rft.isbn_list=9781424419975&rft_id=info:doi/10.1109/WCNC.2008.553&rft_dat=%3Cieee_6IE%3E4489584%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4489584&rfr_iscdi=true