Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

Secure cloud computing with SkIDentity

A cloud-teamroom for the automotive industry
: Kubach, Michael; Özmü, Eray; Flach, Guntram

Fulltext urn:nbn:de:0011-n-3162599 (522 KByte PDF)
MD5 Fingerprint: f7a4b08d1ffebdaa65d497e4b77da544
Created on: 4.4.2018

Hühnlein, Detlef (Ed.); Roßnagel, Heiko (Ed.) ; Gesellschaft für Informatik -GI-, Bonn:
Open Identity Summit 2014 : 04. - 06.11.2014 in Stuttgart, Germany
Bonn: GI, 2014 (GI-Edition - Lecture Notes in Informatics (LNI). Proceedings 237)
ISBN: 978-3-88579-631-2
Open Identity Summit <2014, Stuttgart>
Bundesministerium für Wirtschaft und Technologie BMWi
Trusted Cloud; SkIDentity
Conference Paper, Electronic Publication
Fraunhofer IAO ()
Fraunhofer IGD ()
2D Sketching; data communication; data discovery; Business Field: Digital society; Research Area: Human computer interaction (HCI)

A major security-challenge in the automotive industry is to enable the secure and flexible engineering cooperation with changing partners in complex development projects. Therefore an effective interorganizational identity management is needed to control access to cooperative development platforms. This identity management has to be based on reliable identification of engineers of various partners with different credentials. The SkIDentity-Project, that aims to build trusted identities for the cloud, addresses this scenario. By integrating the existing components, services and trust infrastructures into a comprehensive, legally valid and economically viable identity infrastructure the technology enables to provide trusted identities for the cloud and secure complete business processes and value chains. One pilot-application of the project is the “Cloud-Teamroom for the Automotive Industry”. It is adjusted to the specific requirements of the value chains in the automotive industry. Thanks to the SkIDentity-Technology, and via the so-called eID-Broker, engineers from different partners can access the cloud-teamroom. For the required strong authentication they can use the credentials that are already available in the company. This paper presents the SkIDentity-technology and exemplifies it by means of the pilot-application.