On Constructing a Trusted Path to the User
Title | On Constructing a Trusted Path to the User |
Publication Type | Technical Report |
Year of Publication | 2009 |
Authors | Weaver, N., & Allman M. |
Other Numbers | 2790 |
Abstract | One of the fundamental activities within a network is authentication. Current schemes fail for a number of reasons, but crucially they are almost all vulnerable to end-host compromise and an inability to authenticate transactions. In this preliminary report we argue that a generic trusted path to the user is an essential building block for the future Internet architecture. We sketch the design of a "key fob" that will readily fit on peoples' physical key rings and provide such a trusted path from Internet services to users regardless of the state of the components of that path. |
URL | http://www.icsi.berkeley.edu/pubs/techreports/TR-09-009.pdf |
Bibliographic Notes | ICSI Technical Report TR-09-009 |
Abbreviated Authors | N. Weaver and M. Allman |
ICSI Research Group | Networking and Security |
ICSI Publication Type | Technical Report |