Skip to main content

Toward acceptable metrics of authentication

Publication ,  Conference
Reiter, MK; Stubblebine, SG
Published in: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
January 1, 1997

Authentication using a path of trusted intermediaries, each able to authenticate the next in the path, is a well-known technique for authenticating entities in a large-scale system. Recent work has extended this technique to include multiple paths in an effort to bolster authentication, but the success of this approach may be unclear in the face of intersecting paths, ambiguities in the meaning of certificates, and interdependencies in the use of different keys. Several authors have thus proposed metrics to evaluate the confidence afforded by a set of paths. In this paper we develop a set of guiding principles for the design of such metrics. We motivate our principles by showing how previous approaches fail with respect to them and what the consequences to authentication might be. We then propose a direction for constructing metrics that come closer to meeting our principles and thus, we believe, to being satisfactory metrics for authentication.

Duke Scholars

Published In

Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy

ISSN

1063-7109

Publication Date

January 1, 1997

Start / End Page

10 / 20
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Reiter, M. K., & Stubblebine, S. G. (1997). Toward acceptable metrics of authentication. In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy (pp. 10–20).
Reiter, M. K., and S. G. Stubblebine. “Toward acceptable metrics of authentication.” In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, 10–20, 1997.
Reiter MK, Stubblebine SG. Toward acceptable metrics of authentication. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. 1997. p. 10–20.
Reiter, M. K., and S. G. Stubblebine. “Toward acceptable metrics of authentication.” Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, 1997, pp. 10–20.
Reiter MK, Stubblebine SG. Toward acceptable metrics of authentication. Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. 1997. p. 10–20.

Published In

Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy

ISSN

1063-7109

Publication Date

January 1, 1997

Start / End Page

10 / 20