Abstract
To have certainty about identities is crucial for secure communication in digital environments. The number of digital identities that people and organizations need to manage is rapidly increasing, and proper management of these identities is essential for maintaining security in online markets and communities. Traditional Identity Management Systems are designed to facilitate the management of identities from the perspective of the service provider, but provide little support on the user side. The difficulty of managing identities on the user side causes vulnerabilities that open up for serious attacks such as identity theft and Phishing. Petname Systems have been proposed to provide more user friendly and secure identity management on the user side. This paper provides an analysis of the Petname Model by describing its history and background, properties, application domains and usability issues with emphasis on Security Usability. By covering a broad set of aspects, this paper is intended to provide a comprehensive reference for the Petname System.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Stiegler, M.: Petname systems (August 2005), http://www.skyhunter.com/marcs/petnames/IntroPetNames.html (Last visit on May 20, 2009)
Thanh, D.V., rstad, I.J.: The ambiguity of identity. Telektronikk issue on Identity Management 103, 3–10 (2007)
Jøsang, A., Pope, S.: User centric identity management. In: Asia Pacific Information Technology Security Conference, AusCERT 2005, Austrailia, pp. 77–89 (2005)
Wilcox-O’Hearn, Z.: Names: Decentralized, secure, human-meaningful: Choose two (2005), http://www.zooko.com/distnames.html (Last visit on May 30, 2009)
Internet archive wayback machine:snapshot on zooko’s writing (2008), http://web.archive.org/web//http://zooko.com/distnames.html
Miller, M.: Lambda for humans (2000), http://www.erights.org/elib/capability/pnml.html (Last visit on May 30, 2009)
Shapiro, J.S.: Pet names, true names, and nicknames (2000), http://www.eros-os.org/~majordomo/dcms-dev/0036.html (Last visit on May 30, 2009)
Close, T.: Naming vs. pointing (2003), http://www.waterken.com/dev/YURL/Analogy/ ((Last visit on May 30, 2009)
Close, T.: Waterken YURL:trust management for humans (2003), http://www.waterken.com/dev/YURL/Name/ (Last visit on May 30, 2009)
Jøsang, A., Al Zomai, M., Suriadi, S.: Usability and privacy in identity management architectures. In: Brankovic, L., Steketee, C. (eds.) Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), Ballarat, Australia. ACS. CRPIT., vol. 68, pp. 143–152 (2007)
Close, T.: Petname tool: Enabling web site recognition using the existing SSL infrastructure (2006), http://www.w3.org/2005/Security/usability-ws/papers/02-hp-petname/ (Last visit on May 30, 2009)
Trustbar Firefox addon, http://u.cs.biu.ac.il/~herzbea/TrustBar/ (Last visit on May, 30 2009)
Yee, K.P., Sitaker, K.: Passpet: convenient password management and phishing protection. In: SOUPS, pp. 32–43 (2006)
Close, T.: Petname tool 1.6, https://addons.mozilla.org/en-US/firefox/addon/957 (Last visit on May 30, 2009)
Drelie Gelasca, E., Tomasic, D., Ebrahimi, T.: Which Colors Best Catch Your Eyes: a Subjective Study of Color Saliency. In: Fisrt International Workshop on Video Processing and Quality Metrics for Consumer Electronics, Scottsdale, Arizona, USA (2005)
Wyman, B.: The persistence of identity (2006), http://www.wyman.us/main/2006/12/the_persistence.html (Last visit on May 30, 2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ferdous, M.S., Jøsang, A., Singh, K., Borgaonkar, R. (2009). Security Usability of Petname Systems. In: Jøsang, A., Maseng, T., Knapskog, S.J. (eds) Identity and Privacy in the Internet Age. NordSec 2009. Lecture Notes in Computer Science, vol 5838. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04766-4_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-04766-4_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04765-7
Online ISBN: 978-3-642-04766-4
eBook Packages: Computer ScienceComputer Science (R0)