Banking on interoperability: Secure, interoperable credential management

نویسندگان

  • Glenn S. Benson
  • Shiu-Kai Chin
  • Sean Croston
  • Karthick Jayaraman
  • Susan Older
چکیده

An interoperable credential system allows users to reference a single asymmetric key pair to logon tomultiple web sites and digitally sign transactions. Models that govern how keys are created, authorized, validated, and revoked are a crucial part of such a system. Thesemodels have security, scalability, and liability implications for businesses, so the requirements vary depending on the parties involved. However, the prevailing the public key infrastructure (PKI) system does not meet these diverse needs. PKI requires a certificate authority (CA) to act as a trusted third party for the parties in a transaction. For example, PKI features a receiver key validationmodel that requires the receiver of the transaction to communicate with a CA to validate the sender’s key used to sign a transaction. These aspects conflict with liability concerns and interoperability goals of businesses doing high-value transactions such as wholesale banking. This paper presents Partner Key Management (PKM) as a mechanism which sufficiently addresses security and liability concerns of businesses performing highvalue online transactions, and uses wholesale banking as themotivating example. PKM does not rely on a trusted thirdparty, and features several flexible revocationmodels to accommodate diverse regulations. PKM is not merely a proposal. Rather, the financial industry has implemented the technology in someof itswholesalebanking sites thereby securingmillions of dollars of transactions every day. Finally, this paper justifies the security of PKM and its flexible revocationmodels; and illustrates the justificationwith proofs through formal logic. 2014 Elsevier B.V. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Pluggable, interoperable and extensible (PIE): A grid portal for interoperability

The main challenge grid computing environment faces today is to provide interoperability andenable collaboration between multitudes of grids. Standardization is a long term solution to enable interoperability. Grid portals and gateways have emerged to be important components in addressing interoperability challenge in grid environments to enable collaboration and expand the pool of resources av...

متن کامل

A synchronous, open, user-centric, federated Identity and Access Management System (OpenIdAM)

It is acknowledged that the latest stable XML technologies, standards and specifications may build real interoperable and secure enterprise privacy-aware implementations. However, existing implementations do not address the users’ need to easily handle their identifiers and credentials while providing pluggable modules for interconnecting their pre-existing business applications and platforms. ...

متن کامل

Credentials Management for High-Value Transactions

Partner key management (PKM) is an interoperable credential management protocol for online commercial transactions of high value. PKM reinterprets traditional public key infrastructure (PKI) for use in high-value commercial transactions, which require additional controls on the use of credentials for authentication and authorization. The need for additional controls is met by the use of partner...

متن کامل

Automated Trust Negotiation

Parsimoneous Strategy: a linear strategy with focused disclosures [Winsborough, Seamons, and Jones. DISCEX 2000] Prunes: a quadratic backtracking strategy [Yu, Ma, and Winslett. CCS 2000] Policy graphs: protecting policy content as a sensitive resource [Seamons, Winslett, and Yu. NDSS 2001] Interoperable strategies: closed strategy families [Yu, Winslett, and Seamons. CCS 2001] [Yu, Winslett, a...

متن کامل

SafeTP: Secure, Transparent, Interoperable FTP

SafeTP makes FTP traffic secure, transparent, and interoperable. Security – confidentiality, integrity, and authenticity – is provided by a hybrid public-key and shared-key cryptosystem. Transparency – the ability to use existing FTP software and make it secure – is achieved by the insertion of a proxy layer. Interoperability – compatibility with the installed base of insecure FTP clients and s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer Networks

دوره 67  شماره 

صفحات  -

تاریخ انتشار 2014