On the Deployment of Mobile Trusted Modules
In its recently published TCG mobile reference architecture, the TCG Mobile Phone Work Group specifies a new concept to enable trust into future mobile devices. For this purpose, the TCG devises a trusted mobile platform as a set of trusted engines on behalf of different stakeholders supported by a...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 3174 |
---|---|
container_issue | |
container_start_page | 3169 |
container_title | |
container_volume | |
creator | Schmidt, A.U. Kuntze, N. Kasper, M. |
description | In its recently published TCG mobile reference architecture, the TCG Mobile Phone Work Group specifies a new concept to enable trust into future mobile devices. For this purpose, the TCG devises a trusted mobile platform as a set of trusted engines on behalf of different stakeholders supported by a physical trust-anchor. In this paper, we present our perception on this emerging specification. We propose an approach for the practical design and implementation of this concept and how to deploy it to a trustworthy operating platform. In particular we propose a method for the take-ownership of a device by the user and the migration (i.e., portability) of user credentials between devices. |
doi_str_mv | 10.1109/WCNC.2008.553 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4489584</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4489584</ieee_id><sourcerecordid>4489584</sourcerecordid><originalsourceid>FETCH-LOGICAL-c219t-dbd5f0a90631c9f4d4f5c335a9dd178433542ad9dfc0fac95666eb2a79e16bcd3</originalsourceid><addsrcrecordid>eNotjDtPwzAUhS0eEm1hZGLxjhJ8bV8nd0ThKRW6FDFWjn0tgtKmStKh_54gmM75dPQdIa5B5QCK7j6r9yrXSpU5ojkRM0AsM-1An4o5WG0tEBX67HfQmBkEuBDzYfhWSiu0diZuVzs5frF84H3bHbe8G2WX5FtXNy3LdX8YRo4TxkPLw6U4T74d-Oo_F-Lj6XFdvWTL1fNrdb_MggYas1hHTMqTcgYCJRttwmAMeooRitJO1WofKaagkg-EzjmutS-IwdUhmoW4-fttmHmz75ut748ba0vCyf4BR2xCSw</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>On the Deployment of Mobile Trusted Modules</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Schmidt, A.U. ; Kuntze, N. ; Kasper, M.</creator><creatorcontrib>Schmidt, A.U. ; Kuntze, N. ; Kasper, M.</creatorcontrib><description>In its recently published TCG mobile reference architecture, the TCG Mobile Phone Work Group specifies a new concept to enable trust into future mobile devices. For this purpose, the TCG devises a trusted mobile platform as a set of trusted engines on behalf of different stakeholders supported by a physical trust-anchor. In this paper, we present our perception on this emerging specification. We propose an approach for the practical design and implementation of this concept and how to deploy it to a trustworthy operating platform. In particular we propose a method for the take-ownership of a device by the user and the migration (i.e., portability) of user credentials between devices.</description><identifier>ISSN: 1525-3511</identifier><identifier>ISBN: 1424419972</identifier><identifier>ISBN: 9781424419975</identifier><identifier>EISSN: 1558-2612</identifier><identifier>DOI: 10.1109/WCNC.2008.553</identifier><language>eng</language><publisher>IEEE</publisher><subject>Abstracts ; Application software ; Communications Society ; Computer architecture ; Engines ; Information technology ; Mobile computing ; Mobile handsets ; Programming ; Security</subject><ispartof>2008 IEEE Wireless Communications and Networking Conference, 2008, p.3169-3174</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c219t-dbd5f0a90631c9f4d4f5c335a9dd178433542ad9dfc0fac95666eb2a79e16bcd3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4489584$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,778,782,787,788,2054,27912,54907</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4489584$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Schmidt, A.U.</creatorcontrib><creatorcontrib>Kuntze, N.</creatorcontrib><creatorcontrib>Kasper, M.</creatorcontrib><title>On the Deployment of Mobile Trusted Modules</title><title>2008 IEEE Wireless Communications and Networking Conference</title><addtitle>WCNC</addtitle><description>In its recently published TCG mobile reference architecture, the TCG Mobile Phone Work Group specifies a new concept to enable trust into future mobile devices. For this purpose, the TCG devises a trusted mobile platform as a set of trusted engines on behalf of different stakeholders supported by a physical trust-anchor. In this paper, we present our perception on this emerging specification. We propose an approach for the practical design and implementation of this concept and how to deploy it to a trustworthy operating platform. In particular we propose a method for the take-ownership of a device by the user and the migration (i.e., portability) of user credentials between devices.</description><subject>Abstracts</subject><subject>Application software</subject><subject>Communications Society</subject><subject>Computer architecture</subject><subject>Engines</subject><subject>Information technology</subject><subject>Mobile computing</subject><subject>Mobile handsets</subject><subject>Programming</subject><subject>Security</subject><issn>1525-3511</issn><issn>1558-2612</issn><isbn>1424419972</isbn><isbn>9781424419975</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjDtPwzAUhS0eEm1hZGLxjhJ8bV8nd0ThKRW6FDFWjn0tgtKmStKh_54gmM75dPQdIa5B5QCK7j6r9yrXSpU5ojkRM0AsM-1An4o5WG0tEBX67HfQmBkEuBDzYfhWSiu0diZuVzs5frF84H3bHbe8G2WX5FtXNy3LdX8YRo4TxkPLw6U4T74d-Oo_F-Lj6XFdvWTL1fNrdb_MggYas1hHTMqTcgYCJRttwmAMeooRitJO1WofKaagkg-EzjmutS-IwdUhmoW4-fttmHmz75ut748ba0vCyf4BR2xCSw</recordid><startdate>200803</startdate><enddate>200803</enddate><creator>Schmidt, A.U.</creator><creator>Kuntze, N.</creator><creator>Kasper, M.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200803</creationdate><title>On the Deployment of Mobile Trusted Modules</title><author>Schmidt, A.U. ; Kuntze, N. ; Kasper, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c219t-dbd5f0a90631c9f4d4f5c335a9dd178433542ad9dfc0fac95666eb2a79e16bcd3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Abstracts</topic><topic>Application software</topic><topic>Communications Society</topic><topic>Computer architecture</topic><topic>Engines</topic><topic>Information technology</topic><topic>Mobile computing</topic><topic>Mobile handsets</topic><topic>Programming</topic><topic>Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Schmidt, A.U.</creatorcontrib><creatorcontrib>Kuntze, N.</creatorcontrib><creatorcontrib>Kasper, M.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Schmidt, A.U.</au><au>Kuntze, N.</au><au>Kasper, M.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>On the Deployment of Mobile Trusted Modules</atitle><btitle>2008 IEEE Wireless Communications and Networking Conference</btitle><stitle>WCNC</stitle><date>2008-03</date><risdate>2008</risdate><spage>3169</spage><epage>3174</epage><pages>3169-3174</pages><issn>1525-3511</issn><eissn>1558-2612</eissn><isbn>1424419972</isbn><isbn>9781424419975</isbn><abstract>In its recently published TCG mobile reference architecture, the TCG Mobile Phone Work Group specifies a new concept to enable trust into future mobile devices. For this purpose, the TCG devises a trusted mobile platform as a set of trusted engines on behalf of different stakeholders supported by a physical trust-anchor. In this paper, we present our perception on this emerging specification. We propose an approach for the practical design and implementation of this concept and how to deploy it to a trustworthy operating platform. In particular we propose a method for the take-ownership of a device by the user and the migration (i.e., portability) of user credentials between devices.</abstract><pub>IEEE</pub><doi>10.1109/WCNC.2008.553</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1525-3511 |
ispartof | 2008 IEEE Wireless Communications and Networking Conference, 2008, p.3169-3174 |
issn | 1525-3511 1558-2612 |
language | eng |
recordid | cdi_ieee_primary_4489584 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Abstracts Application software Communications Society Computer architecture Engines Information technology Mobile computing Mobile handsets Programming Security |
title | On the Deployment of Mobile Trusted Modules |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T13%3A01%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=On%20the%20Deployment%20of%20Mobile%20Trusted%20Modules&rft.btitle=2008%20IEEE%20Wireless%20Communications%20and%20Networking%20Conference&rft.au=Schmidt,%20A.U.&rft.date=2008-03&rft.spage=3169&rft.epage=3174&rft.pages=3169-3174&rft.issn=1525-3511&rft.eissn=1558-2612&rft.isbn=1424419972&rft.isbn_list=9781424419975&rft_id=info:doi/10.1109/WCNC.2008.553&rft_dat=%3Cieee_6IE%3E4489584%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4489584&rfr_iscdi=true |