Advertisement

Security Usability of Petname Systems

  • Md. Sadek Ferdous
  • Audun Jøsang
  • Kuldeep Singh
  • Ravishankar Borgaonkar
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5838)

Abstract

To have certainty about identities is crucial for secure communication in digital environments. The number of digital identities that people and organizations need to manage is rapidly increasing, and proper management of these identities is essential for maintaining security in online markets and communities. Traditional Identity Management Systems are designed to facilitate the management of identities from the perspective of the service provider, but provide little support on the user side. The difficulty of managing identities on the user side causes vulnerabilities that open up for serious attacks such as identity theft and Phishing. Petname Systems have been proposed to provide more user friendly and secure identity management on the user side. This paper provides an analysis of the Petname Model by describing its history and background, properties, application domains and usability issues with emphasis on Security Usability. By covering a broad set of aspects, this paper is intended to provide a comprehensive reference for the Petname System.

Keywords

Identity Management Usability Issue Mental Load User Side Security Action 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Stiegler, M.: Petname systems (August 2005), http://www.skyhunter.com/marcs/petnames/IntroPetNames.html (Last visit on May 20, 2009)
  2. 2.
    Thanh, D.V., rstad, I.J.: The ambiguity of identity. Telektronikk issue on Identity Management 103, 3–10 (2007)Google Scholar
  3. 3.
    Jøsang, A., Pope, S.: User centric identity management. In: Asia Pacific Information Technology Security Conference, AusCERT 2005, Austrailia, pp. 77–89 (2005)Google Scholar
  4. 4.
    Wilcox-O’Hearn, Z.: Names: Decentralized, secure, human-meaningful: Choose two (2005), http://www.zooko.com/distnames.html (Last visit on May 30, 2009)
  5. 5.
    Internet archive wayback machine:snapshot on zooko’s writing (2008), http://web.archive.org/web//http://zooko.com/distnames.html
  6. 6.
    Miller, M.: Lambda for humans (2000), http://www.erights.org/elib/capability/pnml.html (Last visit on May 30, 2009)
  7. 7.
    Shapiro, J.S.: Pet names, true names, and nicknames (2000), http://www.eros-os.org/~majordomo/dcms-dev/0036.html (Last visit on May 30, 2009)
  8. 8.
    Close, T.: Naming vs. pointing (2003), http://www.waterken.com/dev/YURL/Analogy/ ((Last visit on May 30, 2009)
  9. 9.
    Close, T.: Waterken YURL:trust management for humans (2003), http://www.waterken.com/dev/YURL/Name/ (Last visit on May 30, 2009)
  10. 10.
    Jøsang, A., Al Zomai, M., Suriadi, S.: Usability and privacy in identity management architectures. In: Brankovic, L., Steketee, C. (eds.) Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), Ballarat, Australia. ACS. CRPIT., vol. 68, pp. 143–152 (2007)Google Scholar
  11. 11.
    Close, T.: Petname tool: Enabling web site recognition using the existing SSL infrastructure (2006), http://www.w3.org/2005/Security/usability-ws/papers/02-hp-petname/ (Last visit on May 30, 2009)
  12. 12.
    Trustbar Firefox addon, http://u.cs.biu.ac.il/~herzbea/TrustBar/ (Last visit on May, 30 2009)
  13. 13.
    Yee, K.P., Sitaker, K.: Passpet: convenient password management and phishing protection. In: SOUPS, pp. 32–43 (2006)Google Scholar
  14. 14.
    Close, T.: Petname tool 1.6, https://addons.mozilla.org/en-US/firefox/addon/957 (Last visit on May 30, 2009)
  15. 15.
    Drelie Gelasca, E., Tomasic, D., Ebrahimi, T.: Which Colors Best Catch Your Eyes: a Subjective Study of Color Saliency. In: Fisrt International Workshop on Video Processing and Quality Metrics for Consumer Electronics, Scottsdale, Arizona, USA (2005)Google Scholar
  16. 16.
    Wyman, B.: The persistence of identity (2006), http://www.wyman.us/main/2006/12/the_persistence.html (Last visit on May 30, 2009)

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Md. Sadek Ferdous
    • 1
    • 2
    • 3
    • 4
  • Audun Jøsang
    • 2
    • 3
  • Kuldeep Singh
    • 1
    • 2
    • 5
  • Ravishankar Borgaonkar
    • 2
    • 5
    • 6
  1. 1.NTNUNorway
  2. 2.UNIKNorway
  3. 3.University of OsloNorway
  4. 4.University of TartuEstonia
  5. 5.TKKNorway
  6. 6.KTHNorway

Personalised recommendations