Banking on interoperability: Secure, interoperable credential management
نویسندگان
چکیده
An interoperable credential system allows users to reference a single asymmetric key pair to logon tomultiple web sites and digitally sign transactions. Models that govern how keys are created, authorized, validated, and revoked are a crucial part of such a system. Thesemodels have security, scalability, and liability implications for businesses, so the requirements vary depending on the parties involved. However, the prevailing the public key infrastructure (PKI) system does not meet these diverse needs. PKI requires a certificate authority (CA) to act as a trusted third party for the parties in a transaction. For example, PKI features a receiver key validationmodel that requires the receiver of the transaction to communicate with a CA to validate the sender’s key used to sign a transaction. These aspects conflict with liability concerns and interoperability goals of businesses doing high-value transactions such as wholesale banking. This paper presents Partner Key Management (PKM) as a mechanism which sufficiently addresses security and liability concerns of businesses performing highvalue online transactions, and uses wholesale banking as themotivating example. PKM does not rely on a trusted thirdparty, and features several flexible revocationmodels to accommodate diverse regulations. PKM is not merely a proposal. Rather, the financial industry has implemented the technology in someof itswholesalebanking sites thereby securingmillions of dollars of transactions every day. Finally, this paper justifies the security of PKM and its flexible revocationmodels; and illustrates the justificationwith proofs through formal logic. 2014 Elsevier B.V. All rights reserved.
منابع مشابه
Pluggable, interoperable and extensible (PIE): A grid portal for interoperability
The main challenge grid computing environment faces today is to provide interoperability andenable collaboration between multitudes of grids. Standardization is a long term solution to enable interoperability. Grid portals and gateways have emerged to be important components in addressing interoperability challenge in grid environments to enable collaboration and expand the pool of resources av...
متن کاملA synchronous, open, user-centric, federated Identity and Access Management System (OpenIdAM)
It is acknowledged that the latest stable XML technologies, standards and specifications may build real interoperable and secure enterprise privacy-aware implementations. However, existing implementations do not address the users’ need to easily handle their identifiers and credentials while providing pluggable modules for interconnecting their pre-existing business applications and platforms. ...
متن کاملCredentials Management for High-Value Transactions
Partner key management (PKM) is an interoperable credential management protocol for online commercial transactions of high value. PKM reinterprets traditional public key infrastructure (PKI) for use in high-value commercial transactions, which require additional controls on the use of credentials for authentication and authorization. The need for additional controls is met by the use of partner...
متن کاملAutomated Trust Negotiation
Parsimoneous Strategy: a linear strategy with focused disclosures [Winsborough, Seamons, and Jones. DISCEX 2000] Prunes: a quadratic backtracking strategy [Yu, Ma, and Winslett. CCS 2000] Policy graphs: protecting policy content as a sensitive resource [Seamons, Winslett, and Yu. NDSS 2001] Interoperable strategies: closed strategy families [Yu, Winslett, and Seamons. CCS 2001] [Yu, Winslett, a...
متن کاملSafeTP: Secure, Transparent, Interoperable FTP
SafeTP makes FTP traffic secure, transparent, and interoperable. Security – confidentiality, integrity, and authenticity – is provided by a hybrid public-key and shared-key cryptosystem. Transparency – the ability to use existing FTP software and make it secure – is achieved by the insertion of a proxy layer. Interoperability – compatibility with the installed base of insecure FTP clients and s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computer Networks
دوره 67 شماره
صفحات -
تاریخ انتشار 2014