Computer Science – Cryptography and Security
Scientific paper
2006-03-13
Computer Science
Cryptography and Security
Pre-refereed version. To appear in Proceedings of the International Conference on Emerging Trends in Information and Communica
Scientific paper
Horizontal integration of access technologies to networks and services should be accompanied by some kind of convergence of authentication technologies. The missing link for the federation of user identities across the technological boundaries separating authentication methods can be provided by trusted computing platforms. The concept of establishing transitive trust by trusted computing enables the desired crossdomain authentication functionality. The focus of target application scenarios lies in the realm of mobile networks and devices.
Kuntze Nicolai
Schmidt Andreas U.
No associations
LandOfFree
Transitive trust in mobile scenarios does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Transitive trust in mobile scenarios, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Transitive trust in mobile scenarios will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-69407