Trusted Computing to Increase Security and Privacy in eID Authentication.
Jan VossaertJorn LaponBart De DeckerVincent NaessensPublished in: SEC (2014)
Keyphrases
- trusted computing
- trusted platform module
- factor authentication
- remote attestation
- computer security
- security mechanisms
- cloud computing
- computing environments
- identity management
- security services
- security issues
- authentication protocol
- security protocols
- computing platform
- virtual organization
- electronic payment
- privacy preserving
- access control policies
- statistical databases
- databases
- sensitive data
- information security
- user authentication
- sensitive information
- biometric template
- access control
- information systems
- resource constrained
- security analysis
- privacy protection
- biometric data
- personal information
- trusted third party
- data mining