authentication metric analysis and design

authentication metric analysis and design

ID:7283681

大小:341.47 KB

頁(yè)數(shù):21頁(yè)

時(shí)間:2018-02-10

authentication metric analysis and design_第1頁(yè)
authentication metric analysis and design_第2頁(yè)
authentication metric analysis and design_第3頁(yè)
authentication metric analysis and design_第4頁(yè)
authentication metric analysis and design_第5頁(yè)
資源描述:

《authentication metric analysis and design》由會(huì)員上傳分享,免費(fèi)在線(xiàn)閱讀,更多相關(guān)內(nèi)容在工程資料-天天文庫(kù)。

1、?ACM,1999.Thisistheauthors'versionofthework.ItispostedherebypermissionofACMforyourpersonaluse.Notforredistribution.Thedefinitiveversionisavailableathttp://doi.acm.org/10.1145/317087.317088.AuthenticationMetricAnalysisandDesignMICHAELK.REITERBellLabor

2、atories,LucentTechnologiesandSTUARTG.STUBBLEBINECertCoAuthenticationusingapathoftrustedintermediaries,eachabletoauthenticatethenextinthepath,isawell-knowntechniqueforauthenticatingentitiesinalarge-scalesystem.Recentworkhasextendedthistechniquetoinclu

3、demultiplepathsinanefforttobolsterauthentica-tion,butthesuccessofthisapproachmaybeunclearinthefaceofintersectingpaths,ambiguitiesinthemeaningofcertificates,andinterdependenciesintheuseofdifferentkeys.Thus,severalauthorshaveproposedmetricstoevaluateth

4、econfidenceaffordedbyasetofpaths.Inthispaperwedevelopasetofguidingprinciplesforthedesignofsuchmetrics.Wemotivateourprinciplesbyshowinghowpreviousapproachesfailedwithrespecttothesepriniciplesandwhattheconsequencestoauthenticationmightbe.Wethenproposea

5、newmetricthatappearstomeetourprinciples,andsotobeasatisfactorymetricofauthentication.CategoriesandSubjectDescriptors:D.4.6[OperatingSystems]:SecurityandProtectionDAuthentication;K.6.5[ManagementofComputingandInformationSystems]:SecurityandProtectionD

6、AuthenticationGeneralTerms:Measurement,SecurityAdditionalKeyWordsandPhrases:Publickeyinfrastructure,metricsofauthentication1.INTRODUCTIONDeterminingtheownerofapublickeyor,conversely,determiningthepublickeyforauser,appearstobeabasicingredientforexecut

7、ingtransactionssecurelyinanylarge-scaleopensystem.DuetothelackofasingleauthorityforprovidingthisinformationinasystemhavingmanyApreliminaryversionofthispaperappearedintheProceedingsofthe1997IEEESymposiumonSecurityandPrivacy(May4±7,1997)pp.10±20.Workof

8、S.G.StubblebinewasperformedatAT&TResearch.Authors'addresses:M.K.Reiter,BellLaboratories,LucentTechnologies,600MountainAvenue,MurrayHill,NJ07974;email:reiter@research.bell-labs.com;http://www.bell-labs.com/user/reiter;S.G.Stubblebine,CertCo,55BroadStr

當(dāng)前文檔最多預(yù)覽五頁(yè),下載文檔查看全文

此文檔下載收益歸作者所有

當(dāng)前文檔最多預(yù)覽五頁(yè),下載文檔查看全文
溫馨提示:
1. 部分包含數(shù)學(xué)公式或PPT動(dòng)畫(huà)的文件,查看預(yù)覽時(shí)可能會(huì)顯示錯(cuò)亂或異常,文件下載后無(wú)此問(wèn)題,請(qǐng)放心下載。
2. 本文檔由用戶(hù)上傳,版權(quán)歸屬用戶(hù),天天文庫(kù)負(fù)責(zé)整理代發(fā)布。如果您對(duì)本文檔版權(quán)有爭(zhēng)議請(qǐng)及時(shí)聯(lián)系客服。
3. 下載前請(qǐng)仔細(xì)閱讀文檔內(nèi)容,確認(rèn)文檔內(nèi)容符合您的需求后進(jìn)行下載,若出現(xiàn)內(nèi)容與標(biāo)題不符可向本站投訴處理。
4. 下載文檔時(shí)可能由于網(wǎng)絡(luò)波動(dòng)等原因無(wú)法下載或下載錯(cuò)誤,付費(fèi)完成后未能成功下載的用戶(hù)請(qǐng)聯(lián)系客服處理。