Entry Reiter:1999:AMA from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Reiter:1999:AMA,
  author =       "Michael K. Reiter and Stuart G. Stubblebine",
  title =        "Authentication metric analysis and design",
  journal =      j-TISSEC,
  volume =       "2",
  number =       "2",
  pages =        "138--158",
  month =        may,
  year =         "1999",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Oct 26 11:39:38 MDT 2000",
  bibsource =    "http://www.acm.org/tissec/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/tissec/1999-2-2/p138-reiter/",
  abstract =     "Authentication using a path of trusted intermediaries,
                 each able to authenticate the next in the path, is a
                 well-known technique for authenticating entities in a
                 large-scale system. Recent work has extended this
                 technique to include multiple paths in an effort to
                 bolster authentication, but the success of this
                 approach may be unclear in the face of intersecting
                 paths, ambiguities in the meaning of certificates, and
                 interdependencies in the use of different keys. Thus,
                 several authors have proposed metrics to evaluate the
                 confidence afforded by a set of paths. In this paper we
                 develop a set of guiding principles for the design of
                 such metrics. We motivate our principles by showing how
                 previous approaches failed with respect to these
                 principles and what the consequences to authentication
                 might be. We then propose a new metric that appears to
                 meet our principles, and so to be a satisfactory metric
                 of authentication.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  generalterms = "Measurement; Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "metrics of authentication; public key infrastructure",
  subject =      "Software --- Operating Systems --- Security and
                 Protection (D.4.6): {\bf Authentication}; Computing
                 Milieux --- Management of Computing and Information
                 Systems --- Security and Protection (K.6.5): {\bf
                 Authentication}",
}

Related entries