Usability challenges of PKI

نویسنده

  • Tobias Straub
چکیده

Introduction Contrary to analysts’ forecasts we heard some years ago, PKI (public key infrastructure) has not become a widespread technology yet. An important reason for this is the insufficient usability PKI-enabled applications are often blamed for [11]. Users’ behavior has turned out to be the biggest risk in security software [10], so usability issues deserve closer attention. Research in the field of usability of security applications has so far focused on the usage of passwords since they are a common security mechanism (see e.g. [6,8] for a survey). The growing importance of PKI requires further efforts since there are peculiarities calling for special treatment.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Research Workshop on Challenges for Trusted Computing

This article identifies and discusses some of the key challenges that need to be addressed if the vision of Trusted Computing is to become reality. Topics addressed include issues with setting up and maintaining the PKI required to support the full set of Trusted Computing functionality, the practical use and verification of attestation evidence, and backwards compatibility, usability and compl...

متن کامل

A Scalable PKI for a National Grid Service

In this paper we describe work to expand the PKI for the UK National Grid Service (NGS), to integrate it with site authentication and improve usability. This work is complementary to the UK Shibboleth deployment. As the NGS grows to support wider and larger scientific communities, we investigate how we can improve usability by tying in Virtual Organisation management into the PKI framework.

متن کامل

Experience with Pki in a Large-scale Distributed Environment

PKI shows some weaknesses when used in real deployment, such as problems with securing the private key, combination of PKI with other authentication systems, availability of revocation information, user-friendliness of PKI system and relationship with federation systems. In this paper we present solutions that were used during PKI deployment in a grid distributed environment.

متن کامل

Finding the PKI needles in the Internet haystack

Public key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a Public Key Infrastructure (PKI). PKIs have become a central asset for many organizations, due to distributed IT and users. Even though the usage of PKIs in closed and controlled environments is quite common, interoperability a...

متن کامل

A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications

Besides the pure technical features, the usability of a PKIenabled application plays a crucial role since the best security application will fail in practice if its usability is insufficient. We present a generic framework to evaluate the usability and utility of PKI-enabled applications with respect to their security features. Our approach is modeled on the Common Criteria methodology and cons...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006