<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//TaxonX//DTD Taxonomic Treatment Publishing DTD v0 20100105//EN" "../../nlm/tax-treatment-NS0.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:tp="http://www.plazi.org/taxpub" article-type="research-article" dtd-version="3.0" xml:lang="en">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">109</journal-id>
      <journal-id journal-id-type="index">urn:lsid:arphahub.com:pub:3dc5f44e-8666-58db-bc76-a455210e8891</journal-id>
      <journal-title-group>
        <journal-title xml:lang="en">JUCS - Journal of Universal Computer Science</journal-title>
        <abbrev-journal-title xml:lang="en">jucs</abbrev-journal-title>
      </journal-title-group>
      <issn pub-type="ppub">0948-695X</issn>
      <issn pub-type="epub">0948-6968</issn>
      <publisher>
        <publisher-name>Journal of Universal Computer Science</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.3217/jucs-016-09-1139</article-id>
      <article-id pub-id-type="publisher-id">29674</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Research Article</subject>
        </subj-group>
        <subj-group subj-group-type="scientific_subject">
          <subject>D.2.9 - Management</subject>
          <subject>D.4.6 - Security and Protection</subject>
          <subject>H.3.2 - Information Storage</subject>
          <subject>H.3.4 - Systems and Software</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>A Trusted Computing Identity Collation Protocol to Simplify Deployment of New Disaster Response Devices</article-title>
      </title-group>
      <contrib-group content-type="authors">
        <contrib contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Danner</surname>
            <given-names>Peter</given-names>
          </name>
          <email xlink:type="simple">peter.danner@iaik.at</email>
          <xref ref-type="aff" rid="A1">1</xref>
        </contrib>
        <contrib contrib-type="author" corresp="no">
          <name name-style="western">
            <surname>Hein</surname>
            <given-names>Daniel</given-names>
          </name>
          <xref ref-type="aff" rid="A1">1</xref>
        </contrib>
      </contrib-group>
      <aff id="A1">
        <label>1</label>
        <addr-line content-type="verbatim">Graz University of Technology, Graz, Austria</addr-line>
        <institution>Graz University of Technology</institution>
        <addr-line content-type="city">Graz</addr-line>
        <country>Austria</country>
      </aff>
      <author-notes>
        <fn fn-type="corresp">
          <p>Corresponding author: Peter Danner (<email xlink:type="simple">peter.danner@iaik.at</email>).</p>
        </fn>
        <fn fn-type="edited-by">
          <p>Academic editor: </p>
        </fn>
      </author-notes>
      <pub-date pub-type="collection">
        <year>2010</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>01</day>
        <month>05</month>
        <year>2010</year>
      </pub-date>
      <volume>16</volume>
      <issue>9</issue>
      <fpage>1139</fpage>
      <lpage>1151</lpage>
      <uri content-type="arpha" xlink:href="http://openbiodiv.net/BF2352DE-C67F-5044-B517-1FCF38F780EC">BF2352DE-C67F-5044-B517-1FCF38F780EC</uri>
      <uri content-type="zenodo_dep_id" xlink:href="https://zenodo.org/record/7001207">7001207</uri>
      <permissions>
        <copyright-statement>Peter Danner, Daniel Hein</copyright-statement>
        <license license-type="creative-commons-attribution" xlink:href="" xlink:type="simple">
          <license-p>This article is freely available under the J.UCS Open Content License.</license-p>
        </license>
      </permissions>
      <abstract>
        <label>Abstract</label>
        <p>The use of modern computing equipment by emergency service units in a disaster area assures increased efficiency during disaster response. Emergency devices must be easy to use and secure. Trusted Computing is a promising approach to help protect the software integrity of commodity emergency devices and thus increase their security. To efficiently use Trusted Computing in an emergency scenario it is necessary to establish an initial trust relationship between the emergency infrastructure providers and a user, her devices, and the software running on those devices. Currently, this requires physical presence of the involved entities. In this paper we propose a remote protocol that employs electronic identity facilities and Trusted Computing to aggregate the identity of a user, the identity of her devices and a set of trusted software states as well as the users facilities and skills. Such a protocol alleviates the need for physical presence. Thus, the protocol facilitates deployment of new electronic emergency equipment, while maintaining a high level of security. We belief that such a protocol is an important step in the process of introducing new capabilities for disaster response.</p>
      </abstract>
    </article-meta>
  </front>
</article>
