Security, Trust and Privacy (STP) in Federated Identity and Access Management Mode and Trusted Computing (TC) Attestation

The federated identity and access management facilitate the home domain users to access multiple resources (services) at the foreign domain using single sign-on facility. They make use of the secure socket layer, firewalls and multi-factor authentication to diminish the security threats. Howev...

Full description

Saved in:
Bibliographic Details
Main Author: AHMAD KHATTAK, ZUBAIR
Format: Thesis
Language:English
Published: 2013
Subjects:
Online Access:http://utpedia.utp.edu.my/id/eprint/21624/1/2012%20-COMPUTER%20%26%20INFORMATION%20SCIENCES%20-%20SECURITY%2C%20TRUST%20AND%20PRIVACY%20%28STP%29%20IN%20FEDERATED%20IDENTITY%20AND%20ACCESS%20MANAGEMENT%20MODE%20AND%20TRUSTED%20COMPUTING%20%28TC%29%20ATTESTATION.pdf
http://utpedia.utp.edu.my/id/eprint/21624/
Tags: Add Tag
No Tags, Be the first to tag this record!
id oai:utpedia.utp.edu.my:21624
record_format eprints
spelling oai:utpedia.utp.edu.my:216242024-07-24T01:01:09Z http://utpedia.utp.edu.my/id/eprint/21624/ Security, Trust and Privacy (STP) in Federated Identity and Access Management Mode and Trusted Computing (TC) Attestation AHMAD KHATTAK, ZUBAIR Q Science (General) The federated identity and access management facilitate the home domain users to access multiple resources (services) at the foreign domain using single sign-on facility. They make use of the secure socket layer, firewalls and multi-factor authentication to diminish the security threats. However, first of all such traditional security gauges do not provide bidirectional protection for the communicating machine's platform integrity in the home domain organization against malevolent programs such as Trojans, worms and viruses. The automated installation of these programs may lead to risks such as the user's login credential theft and the capturing of the user's keyboard inputs remotely. Therefore, the absence of the mutual trust in the communicating machines platform may possibly lead to the security threats in the home and foreign domains. The Trusted Computing solutions such as the trusted platform module and the mutual attestation technique may utilize the integrity measurement architecture to establish the mutual trust and security in the machines platform. However, mutual attestation may lead to the machine's platform security credential privacy concern. Therefore, such concerns demand unified security, trust and privacy solutions in the imminent federated identity and access management mode to collaborate in a secured, trustworthy and privacy-enhanced fashion. 2013-11 Thesis NonPeerReviewed application/pdf en http://utpedia.utp.edu.my/id/eprint/21624/1/2012%20-COMPUTER%20%26%20INFORMATION%20SCIENCES%20-%20SECURITY%2C%20TRUST%20AND%20PRIVACY%20%28STP%29%20IN%20FEDERATED%20IDENTITY%20AND%20ACCESS%20MANAGEMENT%20MODE%20AND%20TRUSTED%20COMPUTING%20%28TC%29%20ATTESTATION.pdf AHMAD KHATTAK, ZUBAIR (2013) Security, Trust and Privacy (STP) in Federated Identity and Access Management Mode and Trusted Computing (TC) Attestation. Doctoral thesis, Universiti Teknologi PETRONAS.
institution Universiti Teknologi Petronas
building UTP Resource Centre
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Petronas
content_source UTP Electronic and Digitized Intellectual Asset
url_provider http://utpedia.utp.edu.my/
language English
topic Q Science (General)
spellingShingle Q Science (General)
AHMAD KHATTAK, ZUBAIR
Security, Trust and Privacy (STP) in Federated Identity and Access Management Mode and Trusted Computing (TC) Attestation
description The federated identity and access management facilitate the home domain users to access multiple resources (services) at the foreign domain using single sign-on facility. They make use of the secure socket layer, firewalls and multi-factor authentication to diminish the security threats. However, first of all such traditional security gauges do not provide bidirectional protection for the communicating machine's platform integrity in the home domain organization against malevolent programs such as Trojans, worms and viruses. The automated installation of these programs may lead to risks such as the user's login credential theft and the capturing of the user's keyboard inputs remotely. Therefore, the absence of the mutual trust in the communicating machines platform may possibly lead to the security threats in the home and foreign domains. The Trusted Computing solutions such as the trusted platform module and the mutual attestation technique may utilize the integrity measurement architecture to establish the mutual trust and security in the machines platform. However, mutual attestation may lead to the machine's platform security credential privacy concern. Therefore, such concerns demand unified security, trust and privacy solutions in the imminent federated identity and access management mode to collaborate in a secured, trustworthy and privacy-enhanced fashion.
format Thesis
author AHMAD KHATTAK, ZUBAIR
author_facet AHMAD KHATTAK, ZUBAIR
author_sort AHMAD KHATTAK, ZUBAIR
title Security, Trust and Privacy (STP) in Federated Identity and Access Management Mode and Trusted Computing (TC) Attestation
title_short Security, Trust and Privacy (STP) in Federated Identity and Access Management Mode and Trusted Computing (TC) Attestation
title_full Security, Trust and Privacy (STP) in Federated Identity and Access Management Mode and Trusted Computing (TC) Attestation
title_fullStr Security, Trust and Privacy (STP) in Federated Identity and Access Management Mode and Trusted Computing (TC) Attestation
title_full_unstemmed Security, Trust and Privacy (STP) in Federated Identity and Access Management Mode and Trusted Computing (TC) Attestation
title_sort security, trust and privacy (stp) in federated identity and access management mode and trusted computing (tc) attestation
publishDate 2013
url http://utpedia.utp.edu.my/id/eprint/21624/1/2012%20-COMPUTER%20%26%20INFORMATION%20SCIENCES%20-%20SECURITY%2C%20TRUST%20AND%20PRIVACY%20%28STP%29%20IN%20FEDERATED%20IDENTITY%20AND%20ACCESS%20MANAGEMENT%20MODE%20AND%20TRUSTED%20COMPUTING%20%28TC%29%20ATTESTATION.pdf
http://utpedia.utp.edu.my/id/eprint/21624/
_version_ 1805891045322391552
score 13.18916