Robust Software Tokens: Towards Se uring a Digital Identity
نویسنده
چکیده
منابع مشابه
Robust Software Tokens: Towards Securing a Digital Identity
This paper presents a new method called the robust software token for providing users with a stable and portable container in which a private key is stored and kept from adversaries, by simple software-only techniques. The proposed scheme is comparable with the related noble work such as a cryptographic camouflage scheme[5] and a networked cryptographic device[10], but equipped with several adv...
متن کاملRobust Software Tokens - Yet Another Method for Securing User's Digital Identity
This paper presents a robust software token that was developed to protect user’s digital identity by simple software-only techniques. This work is closely related to Hoover and Kausik’s software smart cards, and MacKenzie and Reiter’s networked cryptographic devices, in the fact that user’s private key is protected by postulating a remote server rather than tamper-resistance. The robust softwar...
متن کاملDigital Identity and Reputation in the Context of a Bounded Social Ecosystem
This paper highlights the problem of digital identity, or cross-set unique identifying tokens, inherent in the application of social software in business processes. As social software, via blogs, wikis and other Web 2.0 software, starts to bring value to the enterprise, there is a need for a unified digital identity resource. From this basis, concepts of reputation and trust may be leveraged in...
متن کاملProposed Framework for an Interoperable Electronic Identity Management System
Several Member States in the European Union (EU)have rolled out electronic identity (eID) tokens for their citizens. The main objective of these eID tokens is to equip citizens with a tool for Identification, Authentication and electronic Signatures (IAS) for online transactions. Member States have invested heavily in building the infrastructure and the e-government services supporting eID toke...
متن کاملDigital Identity and it's Implication for Electronic Government
The present use of identity concepts is analyzed. A requirements analysis for \identity" reveals the diierent identity properties necessary in various administrative and business processes. A classiication of identity tokens is given and compared with passport identity and established forms of digital identities. A fundamental problem with digital signature identity schemes is explained. Implem...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001