会议论文详细信息
2nd USENIX Workshop on Hot Topics in Security
The Strengths of Weaker Identities: Opportunistic Personas
Mark Allman ; Christian Kreibich ; Vern Paxson ; Robin Sommer ; Nicholas Weaver
PID  :  81302
来源: CEUR
PDF
【 摘 要 】

Cryptographic security mechanisms often assume that keys or certificates are strongly tied to a party’s iden tity. This requirement can in practice impose a high bar on making effective use of the cryptographic protections, because securing the coupling between credentials and actual identity can prove to be an arduous process. We frame a more relaxed form of identity, termed oppor tunistic personas, that works by (i) generating crypto graphic credentials on an asneeded basis, (ii) associat ing credentials not with a user per se but instead as a link to past behavior by the same actor, as a means to inform future interactions, and (iii) managing these credentials implicitly in an opportunistic fashion. Using three real world examples, we illustrate the benefits this unortho

【 预 览 】
附件列表
Files Size Format View
The Strengths of Weaker Identities: Opportunistic Personas 61KB PDF download
  文献评价指标  
  下载次数:6次 浏览次数:3次