Go home now Header Background Image
Submission Procedure
share: |
Follow us
Volume 16 / Issue 9

available in:   PDF (347 kB) PS (1 MB)
Similar Docs BibTeX   Write a comment
Links into Future
DOI:   10.3217/jucs-016-09-1139


A Trusted Computing Identity Collation Protocol to Simplify Deployment of New Disaster Response Devices

Peter Danner (Graz University of Technology, Austria)

Daniel Hein (Graz University of Technology, Austria)

Abstract: The use of modern computing equipment by emergency service units in a disaster area assures increased efficiency during disaster response. Emergency devices must be easy to use and secure. Trusted Computing is a promising approach to help protect the software integrity of commodity emergency devices and thus increase their security. To efficiently use Trusted Computing in an emergency scenario it is necessary to establish an initial trust relationship between the emergency infrastructure providers and a user, her devices, and the software running on those devices. Currently, this requires physical presence of the involved entities. In this paper we propose a remote protocol that employs electronic identity facilities and Trusted Computing to aggregate the identity of a user, the identity of her devices and a set of trusted software states as well as the users facilities and skills. Such a protocol alleviates the need for physical presence. Thus, the protocol facilitates deployment of new electronic emergency equipment, while maintaining a high level of security. We belief that such a protocol is an important step in the process of introducing new capabilities for disaster response.

Keywords: TPM, disaster response, eID, electronic identity, trusted computing

Categories: D.2.9, D.4.6, H.3.2, H.3.4