Mark Allman / ICSI @mallman_icsi

Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver. The Strengths of Weaker Identities: Opportunistic Personas. USENIX Workshop on Hot Topics in Security (HotSec), August 2007.
PDF | Slides

Abstract:

Cryptographic security mechanisms often assume that keys or certificates are strongly tied to a party's identity. This requirement can in practice impose a high bar on making effective use of the cryptographic protections, because securing the coupling between credentials and actual identity can prove to be an arduous process. We frame a more relaxed form of identity, termed opportunistic personas, that works by (i) generating cryptographic credentials on an as-needed basis, (ii) associating credentials not with a user per se but instead as a link to past behavior by the same actor, as a means to inform future interactions, and (iii) managing these credentials implicitly in an opportunistic fashion. Using three real-world examples, we illustrate the benefits this unorthodox approach to identity management can yield.

BibTeX:

@inproceedings{AKP+07,
    author    =        "Mark Allman and Christian Kreibich and Vern Paxson and Robin Sommer and Nicholas Weaver",
    title     =        "{The Strengths of Weaker Identities: Opportunistic Personas}",
    booktitle =        "USENIX Workshop on Hot Topics in Security (HotSec)",
    year      =        2007,
    mont      =        aug,
}
"We are what we repeatedly do. Excellence, then, is not an act, but a habit." --Aristotle