[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

A consistent history authentication protocol

Published: 01 May 2006 Publication History

Abstract

Traditional strong authentication systems rely on a certification chain to delegate the authority of trusting an intermediate end. However, in some practical life scenarios a relayed authentication is not accepted and thus it would be advisable a straight proof of trustiness with a direct interaction with the involved party. Our protocol introduces a registry of certified operations from which it descends the authentication and the consequent proof of identity. Despite the fact that such system requires for registrar initialization, the Consistent History Protocol provides a reasonable degree of reliability in identifying subjects at the steady state. As application, we deployed the protocol in the indirect electronic data collection scenario, where large data flows have to be exchanged and certified among a set of mutually trusted Institutions. The experimental results report the processing overhead introduced by the authentication protocol, which results negligible with respect a classical strong authentication method built around the OpenSSL library.

References

[1]
D. D. Steinauer, S. A. Wakid, and S. Rasberry, "Trust and Traceability in Electronic Commerce," in StandardView, vol. 5, 1997.]]
[2]
C. W. Higgins and L. P. S. Lubersky, "Legal Issues of Electronic Commerce: Activity Policies, Intelligent Agents and Ethical Transactions," presented at SGML/XML Europe, Paris, 1998.]]
[3]
A. McCullagh and W. Caelli, "Non-Repudiation in the Digital Environment," in First Monday, vol. 5: University of Illinois at Chicago Library, 2000.]]
[4]
"Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures," in Official Journal L 013, 19/01/2000 P. 0012 - 0020, 1999.]]
[5]
D. Kahn, The Codebreakers: Scribner, 1996.]]
[6]
J. Claessens, B. Preneel, and J. Vandewalle, "(How) Can Mobile Agents Do Secure Electronic Transactions on Untrusted Hosts? A Survey of the Security Issues and the Current Solutions," ACM Transactions on Internet Technology, vol. 3, pp. 28--48, 2003.]]
[7]
M. Fischer and N. Lynch, "A lower bound for the time to assure interactive consistency," Information Processing Letters, vol. 14, pp. 183--186, 1982.]]
[8]
G. Edjlali, A. Acharya, and V. Chaudhary, "History-based Access Control for Mobile Code," presented at 5th Conference on Computer and Communications Security, San Francisco, CA, USA, 1998.]]
[9]
L. Chen, D. Gollmann, and C. J. Mitchell, "Authentication Using Minimally Trusted Servers," ACM Operating Systems Review, vol. 31, pp. 16--28, 1997.]]
[10]
J. Viega, M. Messier, and P. Chandra, Network Security with OpenSSL: O'Reilly, 2002.]]
[11]
M. Stree and G. Sebastian, Cracking DES: Secrets of Encryption Research: O'Reilly & Associates, 1998.]]
[12]
T. Dierks and C. Allen, "The TLS Protocol," Certicom, RFC 2246, January 1999.]]
[13]
H. Beker, Cipher Systems: the Protection of Communications: John Wiley & Sons, 1983.]]
[14]
T. Bernes-Lee and M. McCahill, "Uniform Resource Locators," CERN, Geneva, RFC 1738, 1994.]]
[15]
P. LeMahieu and J. Bruck, "A Consistent History Link Connectivity Protocol," presented at Annual ACM Symposium on Principles of Distributed Computing, Puerto Vallarta, Mexico, 1998.]]
[16]
G. Rotondi, G. Mattioni, S. Bombelli, A. Allegra, A. Marsico, S. Losco, and A. Sorce, "The Data Flow Exchange Software," The CODACMOS Project, EUROSTAT, Helsinki, Technical Report September 2003.]]

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGSOFT Software Engineering Notes
ACM SIGSOFT Software Engineering Notes  Volume 31, Issue 3
May 2006
171 pages
ISSN:0163-5948
DOI:10.1145/1127878
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 May 2006
Published in SIGSOFT Volume 31, Issue 3

Check for updates

Author Tags

  1. SSL
  2. authentication
  3. dentification
  4. non repudiation
  5. trust

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 393
    Total Downloads
  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 24 Dec 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media