Reference Hub3
Entity Authentication and Trust Validation in PKI Using Petname Systems

Entity Authentication and Trust Validation in PKI Using Petname Systems

Md. Sadek Ferdous, Audun Jøsang
ISBN13: 9781466640306|ISBN10: 1466640308|EISBN13: 9781466640313
DOI: 10.4018/978-1-4666-4030-6.ch013
Cite Chapter Cite Chapter

MLA

Ferdous, Md. Sadek, and Audun Jøsang. "Entity Authentication and Trust Validation in PKI Using Petname Systems." Theory and Practice of Cryptography Solutions for Secure Information Systems, edited by Atilla Elçi, et al., IGI Global, 2013, pp. 302-333. https://doi.org/10.4018/978-1-4666-4030-6.ch013

APA

Ferdous, M. S. & Jøsang, A. (2013). Entity Authentication and Trust Validation in PKI Using Petname Systems. In A. Elçi, J. Pieprzyk, A. Chefranov, M. Orgun, H. Wang, & R. Shankaran (Eds.), Theory and Practice of Cryptography Solutions for Secure Information Systems (pp. 302-333). IGI Global. https://doi.org/10.4018/978-1-4666-4030-6.ch013

Chicago

Ferdous, Md. Sadek, and Audun Jøsang. "Entity Authentication and Trust Validation in PKI Using Petname Systems." In Theory and Practice of Cryptography Solutions for Secure Information Systems, edited by Atilla Elçi, et al., 302-333. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-4030-6.ch013

Export Reference

Mendeley
Favorite

Abstract

Recognition of identities and certainty about identity ownership are crucial factors for secure communication in digital environments. Identity Management Systems have been designed to aid users as well as organisations to manage different user identities. However, traditional Identity Management Systems are primarily designed to facilitate the management of identities from the perspective of the service provider, but provide little support on the user side to manage organisational identities. Public Key Infrastructures (PKI) is the primary tool in aiding users to manage such identities on their sides as well as to establish trust during online transactions. Nevertheless, the complexities and difficulties involved in managing and understanding such certificates from the general public’s point of view are overlooked. This causes vulnerabilities that open up for serious attacks such as identity theft and Phishing. Petname Systems have been proposed for managing organisational identities on the user side in order to improve the user friendliness and to strengthen security. This chapter provides an analysis of the Petname Model by describing its history and background, properties, application domains, and usability issues, and explains how a Petname System can be effectively combined with the PKI to recognise identities and impose certainty by validating the user trust on those identities. The chapter also presents an analysis on two applications that integrate the Public Key Infrastructure with the Petname Model.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.