Skip to main content

Security Usability of Petname Systems

  • Conference paper
Book cover Identity and Privacy in the Internet Age (NordSec 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5838))

Included in the following conference series:

Abstract

To have certainty about identities is crucial for secure communication in digital environments. The number of digital identities that people and organizations need to manage is rapidly increasing, and proper management of these identities is essential for maintaining security in online markets and communities. Traditional Identity Management Systems are designed to facilitate the management of identities from the perspective of the service provider, but provide little support on the user side. The difficulty of managing identities on the user side causes vulnerabilities that open up for serious attacks such as identity theft and Phishing. Petname Systems have been proposed to provide more user friendly and secure identity management on the user side. This paper provides an analysis of the Petname Model by describing its history and background, properties, application domains and usability issues with emphasis on Security Usability. By covering a broad set of aspects, this paper is intended to provide a comprehensive reference for the Petname System.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Stiegler, M.: Petname systems (August 2005), http://www.skyhunter.com/marcs/petnames/IntroPetNames.html (Last visit on May 20, 2009)

  2. Thanh, D.V., rstad, I.J.: The ambiguity of identity. Telektronikk issue on Identity Management 103, 3–10 (2007)

    Google Scholar 

  3. Jøsang, A., Pope, S.: User centric identity management. In: Asia Pacific Information Technology Security Conference, AusCERT 2005, Austrailia, pp. 77–89 (2005)

    Google Scholar 

  4. Wilcox-O’Hearn, Z.: Names: Decentralized, secure, human-meaningful: Choose two (2005), http://www.zooko.com/distnames.html (Last visit on May 30, 2009)

  5. Internet archive wayback machine:snapshot on zooko’s writing (2008), http://web.archive.org/web//http://zooko.com/distnames.html

  6. Miller, M.: Lambda for humans (2000), http://www.erights.org/elib/capability/pnml.html (Last visit on May 30, 2009)

  7. Shapiro, J.S.: Pet names, true names, and nicknames (2000), http://www.eros-os.org/~majordomo/dcms-dev/0036.html (Last visit on May 30, 2009)

  8. Close, T.: Naming vs. pointing (2003), http://www.waterken.com/dev/YURL/Analogy/ ((Last visit on May 30, 2009)

  9. Close, T.: Waterken YURL:trust management for humans (2003), http://www.waterken.com/dev/YURL/Name/ (Last visit on May 30, 2009)

  10. Jøsang, A., Al Zomai, M., Suriadi, S.: Usability and privacy in identity management architectures. In: Brankovic, L., Steketee, C. (eds.) Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), Ballarat, Australia. ACS. CRPIT., vol. 68, pp. 143–152 (2007)

    Google Scholar 

  11. Close, T.: Petname tool: Enabling web site recognition using the existing SSL infrastructure (2006), http://www.w3.org/2005/Security/usability-ws/papers/02-hp-petname/ (Last visit on May 30, 2009)

  12. Trustbar Firefox addon, http://u.cs.biu.ac.il/~herzbea/TrustBar/ (Last visit on May, 30 2009)

  13. Yee, K.P., Sitaker, K.: Passpet: convenient password management and phishing protection. In: SOUPS, pp. 32–43 (2006)

    Google Scholar 

  14. Close, T.: Petname tool 1.6, https://addons.mozilla.org/en-US/firefox/addon/957 (Last visit on May 30, 2009)

  15. Drelie Gelasca, E., Tomasic, D., Ebrahimi, T.: Which Colors Best Catch Your Eyes: a Subjective Study of Color Saliency. In: Fisrt International Workshop on Video Processing and Quality Metrics for Consumer Electronics, Scottsdale, Arizona, USA (2005)

    Google Scholar 

  16. Wyman, B.: The persistence of identity (2006), http://www.wyman.us/main/2006/12/the_persistence.html (Last visit on May 30, 2009)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ferdous, M.S., Jøsang, A., Singh, K., Borgaonkar, R. (2009). Security Usability of Petname Systems. In: Jøsang, A., Maseng, T., Knapskog, S.J. (eds) Identity and Privacy in the Internet Age. NordSec 2009. Lecture Notes in Computer Science, vol 5838. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04766-4_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04766-4_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04765-7

  • Online ISBN: 978-3-642-04766-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics