Usability challenges of PKI
نویسنده
چکیده
Introduction Contrary to analysts’ forecasts we heard some years ago, PKI (public key infrastructure) has not become a widespread technology yet. An important reason for this is the insufficient usability PKI-enabled applications are often blamed for [11]. Users’ behavior has turned out to be the biggest risk in security software [10], so usability issues deserve closer attention. Research in the field of usability of security applications has so far focused on the usage of passwords since they are a common security mechanism (see e.g. [6,8] for a survey). The growing importance of PKI requires further efforts since there are peculiarities calling for special treatment.
منابع مشابه
Research Workshop on Challenges for Trusted Computing
This article identifies and discusses some of the key challenges that need to be addressed if the vision of Trusted Computing is to become reality. Topics addressed include issues with setting up and maintaining the PKI required to support the full set of Trusted Computing functionality, the practical use and verification of attestation evidence, and backwards compatibility, usability and compl...
متن کاملA Scalable PKI for a National Grid Service
In this paper we describe work to expand the PKI for the UK National Grid Service (NGS), to integrate it with site authentication and improve usability. This work is complementary to the UK Shibboleth deployment. As the NGS grows to support wider and larger scientific communities, we investigate how we can improve usability by tying in Virtual Organisation management into the PKI framework.
متن کاملExperience with Pki in a Large-scale Distributed Environment
PKI shows some weaknesses when used in real deployment, such as problems with securing the private key, combination of PKI with other authentication systems, availability of revocation information, user-friendliness of PKI system and relationship with federation systems. In this paper we present solutions that were used during PKI deployment in a grid distributed environment.
متن کاملFinding the PKI needles in the Internet haystack
Public key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a Public Key Infrastructure (PKI). PKIs have become a central asset for many organizations, due to distributed IT and users. Even though the usage of PKIs in closed and controlled environments is quite common, interoperability a...
متن کاملA Framework for Evaluating the Usability and the Utility of PKI-enabled Applications
Besides the pure technical features, the usability of a PKIenabled application plays a crucial role since the best security application will fail in practice if its usability is insufficient. We present a generic framework to evaluate the usability and utility of PKI-enabled applications with respect to their security features. Our approach is modeled on the Common Criteria methodology and cons...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006