Economic aspects of web authentication
نویسنده
چکیده
In year 2008, 51.3 % of the world population owned a mobile phone, today probably being significantly higher the figure. To be able to reach a good enough security level, a hardware authentication device might be the only option. But since this means that the user needs to bring an extra item all the time it is argued that the mobile phone could be used as a hardware authentication device. But using the mobile phone in web authentication means different types of costs than with another type of hardware authentication device and this is therefore analysed in the study. A model is presented that can be used when evaluating web authentication in general and with mobile phones in specific. It concludes with the fact that it is difficult defining a specific cost since it depends on many variables, but by using the model one should be able to reach a good estimate in each situation.
منابع مشابه
Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns
The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...
متن کاملThe Inconvenient Truth about Web Certificates
HTTPS is the de facto standard for securing Internet communications. Although it is widely deployed, the security provided with HTTPS in practice is dubious. HTTPS may fail to provide security for multiple reasons, mostly due to certificate-based authentication failures. Given the importance of HTTPS, we investigate the current scale and practices of HTTPS and certificate-based deployment. We p...
متن کاملEconomic Incentives in the HTTPS Authentication Process
In this paper, the authentication system of the HTTPS protocol is considered from an economical perspective. The use of SSL certificates to authenticate web servers has a number of known technical flaws but is widely used. The different actors of the HTTPS authentication system are identified and the study of their roles and incentives for security shows the lack of a clear reason to progress t...
متن کاملContributions to Web Authentication for Untrusted Computers
Authentication methods offer varying levels of security. Methods with one-time credentials generated by dedicated hardware tokens can reach a high level of security, whereas passwordbased authentication methods have a low level of security since passwords can be eavesdropped and stolen by an attacker. Password-based methods are dominant in web authentication since they are both easy to implemen...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011