1998
DOI: 10.1109/12.737682
|View full text |Cite
|
Sign up to set email alerts
|

Resilient authentication using path independence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
49
0

Year Published

1999
1999
2017
2017

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 60 publications
(49 citation statements)
references
References 17 publications
0
49
0
Order By: Relevance
“…Crowdsourcing has long been explored by the security community, e.g., for spam detection where email recipients can flag emails as 'spam' [10,62], validating certificates [42,58], 'peer patching' where collaborating nodes can attain better security by sharing information [7,14], and improved security and privacy through a focus on communities [15,21]. Other examples of crowdsourcingbased systems are the Crowdroid malware-detection framework that dynamically analyzes apps' behaviors [6], and the Super-Ego framework that resides between the smartphone OS and apps and leverages crowdsourcing to decide whether to grant apps access to location [55].…”
Section: Related Work Crowdsourcingmentioning
confidence: 99%
“…Crowdsourcing has long been explored by the security community, e.g., for spam detection where email recipients can flag emails as 'spam' [10,62], validating certificates [42,58], 'peer patching' where collaborating nodes can attain better security by sharing information [7,14], and improved security and privacy through a focus on communities [15,21]. Other examples of crowdsourcingbased systems are the Crowdroid malware-detection framework that dynamically analyzes apps' behaviors [6], and the Super-Ego framework that resides between the smartphone OS and apps and leverages crowdsourcing to decide whether to grant apps access to location [55].…”
Section: Related Work Crowdsourcingmentioning
confidence: 99%
“…They suggest using multiple paths to increase assurance on authentication. It is important to notice here that a Session Authority or SA in our system differs significantly from the security authority in [30]. A security authority is used to enforce security policies and processes for a security realm so as to prevent attacks from accessing the applications and resources within that realm.…”
Section: Related Workmentioning
confidence: 99%
“…The solution proposed in the paper adopts bridge CAs to connect the CAs in different security realms so that a certificate can be validated through a path which may cross multiple security realms. Reiter and Stubblebine in [30] argue that an authentication process in a large-scale distributed system often needs the assistance of a path of security authorities as it is difficult to locate a single authority to authenticate all the principals in the system. They suggest using multiple paths to increase assurance on authentication.…”
Section: Related Workmentioning
confidence: 99%
“…The present paper uses their calculation method as an underlying technique to further develop algorithms for solving the above problem. Reiter and Stubblebine [10] proposed resilient authentication by using redundant multiple independent trust paths constructed from a trusted certificate authority (CA) to gain increased assurance in the authentication for public key infrastructure (PKI). The drawback is that they did not quantitatively evaluate trust for certificates by implicitly assuming that each certificate has the same level of risk.…”
Section: Related Workmentioning
confidence: 99%