z-logo
open-access-imgOpen Access
Transitive Trust in Mobile Scenarios
Author(s) -
Nicolai Kuntze,
Andreas Schmidt
Publication year - 2006
Publication title -
lecture notes in computer science
Language(s) - English
Resource type - Book series
SCImago Journal Rank - 0.249
H-Index - 400
eISSN - 1611-3349
pISSN - 0302-9743
ISBN - 3-540-34640-6
DOI - 10.1007/11766155_6
Subject(s) - computer science , transitive relation , authentication (law) , focus (optics) , realm , computer security , domain (mathematical analysis) , convergence (economics) , mathematical analysis , physics , mathematics , combinatorics , law , political science , optics , economics , economic growth
Horizontal integration of access technologies to networks and services should be accompanied by some kind of convergence of authentication technologies. The missing link for the federation of user identities across the technological boundaries separating authentication methods can be provided by trusted computing platforms. The concept of establishing transitive trust by trusted computing enables the desired cross-domain authentication functionality. The focus of target application scenarios lies in the realm of mobile networks and devices.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom