Economic aspects of web authentication

نویسنده

  • Pernilla Stolpe Johansson
چکیده

In year 2008, 51.3 % of the world population owned a mobile phone, today probably being significantly higher the figure. To be able to reach a good enough security level, a hardware authentication device might be the only option. But since this means that the user needs to bring an extra item all the time it is argued that the mobile phone could be used as a hardware authentication device. But using the mobile phone in web authentication means different types of costs than with another type of hardware authentication device and this is therefore analysed in the study. A model is presented that can be used when evaluating web authentication in general and with mobile phones in specific. It concludes with the fact that it is difficult defining a specific cost since it depends on many variables, but by using the model one should be able to reach a good estimate in each situation.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns

The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...

متن کامل

The Inconvenient Truth about Web Certificates

HTTPS is the de facto standard for securing Internet communications. Although it is widely deployed, the security provided with HTTPS in practice is dubious. HTTPS may fail to provide security for multiple reasons, mostly due to certificate-based authentication failures. Given the importance of HTTPS, we investigate the current scale and practices of HTTPS and certificate-based deployment. We p...

متن کامل

Economic Incentives in the HTTPS Authentication Process

In this paper, the authentication system of the HTTPS protocol is considered from an economical perspective. The use of SSL certificates to authenticate web servers has a number of known technical flaws but is widely used. The different actors of the HTTPS authentication system are identified and the study of their roles and incentives for security shows the lack of a clear reason to progress t...

متن کامل

Contributions to Web Authentication for Untrusted Computers

Authentication methods offer varying levels of security. Methods with one-time credentials generated by dedicated hardware tokens can reach a high level of security, whereas passwordbased authentication methods have a low level of security since passwords can be eavesdropped and stolen by an attacker. Password-based methods are dominant in web authentication since they are both easy to implemen...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011