Skip to main content

Authentication Metric Analysis and Design

Publication ,  Journal Article
Reiter, MK; Stubblebine, SG
Published in: ACM Transactions on Information and System Security
May 1, 1999

Authentication using a path of trusted intermediaries, each able to authenticate the next in the path, is a well-known technique for authenticating entities in a large-scale system. Recent work has extended this technique to include multiple paths in an effort to bolster authentication, but the success of this approach may be unclear in the face of intersecting paths, ambiguities in the meaning of certificates, and interdependencies in the use of different keys. Thus, several authors have proposed metrics to evaluate the confidence afforded by a set of paths. In this paper we develop a set of guiding principles for the design of such metrics. We motivate our principles by showing how previous approaches failed with respect to these priniciples and what the consequences to authentication might be. We then propose a new metric that appears to meet our principles, and so to be a satisfactory metric of authentication. © 1999, ACM. All rights reserved.

Duke Scholars

Altmetric Attention Stats
Dimensions Citation Stats

Published In

ACM Transactions on Information and System Security

DOI

EISSN

1557-7406

ISSN

1094-9224

Publication Date

May 1, 1999

Volume

2

Issue

2

Start / End Page

138 / 158

Related Subject Headings

  • Strategic, Defence & Security Studies
  • 4609 Information systems
  • 4604 Cybersecurity and privacy
  • 0806 Information Systems
  • 0804 Data Format
  • 0803 Computer Software
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Reiter, M. K., & Stubblebine, S. G. (1999). Authentication Metric Analysis and Design. ACM Transactions on Information and System Security, 2(2), 138–158. https://doi.org/10.1145/317087.317088
Reiter, M. K., and S. G. Stubblebine. “Authentication Metric Analysis and Design.” ACM Transactions on Information and System Security 2, no. 2 (May 1, 1999): 138–58. https://doi.org/10.1145/317087.317088.
Reiter MK, Stubblebine SG. Authentication Metric Analysis and Design. ACM Transactions on Information and System Security. 1999 May 1;2(2):138–58.
Reiter, M. K., and S. G. Stubblebine. “Authentication Metric Analysis and Design.” ACM Transactions on Information and System Security, vol. 2, no. 2, May 1999, pp. 138–58. Scopus, doi:10.1145/317087.317088.
Reiter MK, Stubblebine SG. Authentication Metric Analysis and Design. ACM Transactions on Information and System Security. 1999 May 1;2(2):138–158.

Published In

ACM Transactions on Information and System Security

DOI

EISSN

1557-7406

ISSN

1094-9224

Publication Date

May 1, 1999

Volume

2

Issue

2

Start / End Page

138 / 158

Related Subject Headings

  • Strategic, Defence & Security Studies
  • 4609 Information systems
  • 4604 Cybersecurity and privacy
  • 0806 Information Systems
  • 0804 Data Format
  • 0803 Computer Software