Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)
DOI: 10.1109/secpri.1997.601308
|View full text |Cite
|
Sign up to set email alerts
|

Toward acceptable metrics of authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
60
0

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 49 publications
(60 citation statements)
references
References 22 publications
0
60
0
Order By: Relevance
“…Hence we disagree at a conceptual level with the approach taken by Beth, Borcherding and Klein [3] and principle 2 of Reiter and Stubblebine [16,14]: it is not necessary to define the parameters (i.e., the confidence values) of an authentication method as "negative and positive experiences" or frequencies.…”
Section: Contributions Of This Pap Ermentioning
confidence: 76%
See 1 more Smart Citation
“…Hence we disagree at a conceptual level with the approach taken by Beth, Borcherding and Klein [3] and principle 2 of Reiter and Stubblebine [16,14]: it is not necessary to define the parameters (i.e., the confidence values) of an authentication method as "negative and positive experiences" or frequencies.…”
Section: Contributions Of This Pap Ermentioning
confidence: 76%
“…Nevertheless, interpreting this parameter as a probability of 0.8 makes sense. This is a point that is often misunderstood [3,16,14]. Of course, the parameters are generally based also on some form of past experience, but such experience almost never arises in the form of relative frequencies.…”
Section: Contributions Of This Pap Ermentioning
confidence: 99%
“…Therefore, we validate our model on the basis of some relevant principles (e. g., proposed in [20,19] and [17]) and on aspects, which have been criticized in other trust models.…”
Section: Discussionmentioning
confidence: 99%
“…Unlike the models using operators to combine two opinions, Maurer proposes to calculate the resulting trust value on the basis of probability calculus instead and avoids thus the above-mentioned trust graph evaluation problem. However, the trust model is limited to public key authentication, and it has been criticised to make the restricting implicit assumption, that each principal holds exactly one key pair [19].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation