JUCS - Journal of Universal Computer Science 16(9): 1139-1151, doi: 10.3217/jucs-016-09-1139
A Trusted Computing Identity Collation Protocol to Simplify Deployment of New Disaster Response Devices
expand article infoPeter Danner, Daniel Hein
‡ Graz University of Technology, Graz, Austria
Open Access
Abstract
The use of modern computing equipment by emergency service units in a disaster area assures increased efficiency during disaster response. Emergency devices must be easy to use and secure. Trusted Computing is a promising approach to help protect the software integrity of commodity emergency devices and thus increase their security. To efficiently use Trusted Computing in an emergency scenario it is necessary to establish an initial trust relationship between the emergency infrastructure providers and a user, her devices, and the software running on those devices. Currently, this requires physical presence of the involved entities. In this paper we propose a remote protocol that employs electronic identity facilities and Trusted Computing to aggregate the identity of a user, the identity of her devices and a set of trusted software states as well as the users facilities and skills. Such a protocol alleviates the need for physical presence. Thus, the protocol facilitates deployment of new electronic emergency equipment, while maintaining a high level of security. We belief that such a protocol is an important step in the process of introducing new capabilities for disaster response.
Keywords
trusted computing, disaster response, electronic identity, eID, TPM