DocumentCode :
3208104
Title :
Toward acceptable metrics of authentication
Author :
Reiter, Michael K. ; Stubblebine, Stuart G.
Author_Institution :
Res. Labs., AT&T Bell Labs., Murray Hill, NJ, USA
fYear :
1997
fDate :
4-7 May 1997
Firstpage :
10
Lastpage :
20
Abstract :
Authentication using a path of trusted intermediaries, each able to authenticate the next one in the path, is a well-known technique for authenticating entities in a large-scale system. Recent work has extended this technique to include multiple paths in an effort to bolster authentication, but the success of this approach may be unclear in the face of intersecting paths, ambiguities in the meaning of certificates, and interdependencies in the use of different keys. Several authors have thus proposed metrics to evaluate the confidence afforded by a set of paths. In this paper, we develop a set of guiding principles for the design of such metrics. We motivate our principles by showing how previous approaches fail with respect to them and what the consequences to authentication might be. We then propose a direction for constructing metrics that come closer to meeting our principles and thus, we believe, to being satisfactory metrics for authentication
Keywords :
message authentication; acceptability; ambiguities; authentication metrics design; certificates; confidence; intersecting paths; key interdependencies; large-scale system; multiple paths; trusted intermediaries; Authentication; Decision support systems; Large-scale systems; Open systems; Public key; Web services;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy, 1997. Proceedings., 1997 IEEE Symposium on
Conference_Location :
Oakland, CA
ISSN :
1081-6011
Print_ISBN :
0-8186-7828-3
Type :
conf
DOI :
10.1109/SECPRI.1997.601308
Filename :
601308
Link To Document :
بازگشت