Publication Details

Title: On Constructing a Trusted Path to the User
Author: N. Weaver and M. Allman
Group: ICSI Technical Reports
Date: December 2009
PDF: http://www.icsi.berkeley.edu/pubs/techreports/TR-09-009.pdf

Overview:
One of the fundamental activities within a network is authentication. Current schemes fail for a number of reasons, but crucially they are almost all vulnerable to end-host compromise and an inability to authenticate transactions. In this preliminary report we argue that a generic trusted path to the user is an essential building block for the future Internet architecture. We sketch the design of a "key fob" that will readily fit on peoples' physical key rings and provide such a trusted path from Internet services to users regardless of the state of the components of that path.

Bibliographic Information:
ICSI Technical Report TR-09-009

Bibliographic Reference:
N. Weaver and M. Allman. On Constructing a Trusted Path to the User. ICSI Technical Report TR-09-009, December 2009