Peer to Peer: Collaboration and Sharing over the Internet
Peer to Peer: Collaboration and Sharing over the Internet
Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure
Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure
Service Location Protocol: Automatic Discovery of IP Network Services
IEEE Internet Computing
Autoconfiguration for IP Networking: Enabling Local Communication
IEEE Internet Computing
Good-Enough Security: Toward a Pragmatic Business-Driven Discipline
IEEE Internet Computing
Lessons Learned in Implementing and Deploying Crypto Software
Proceedings of the 11th USENIX Security Symposium
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
A reliable, scalable general-purpose certificate store
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
UPnP Design by Example: A Software Developer's Guide to Universal Plug and Play
UPnP Design by Example: A Software Developer's Guide to Universal Plug and Play
The design of a cryptographic security architecture
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Network security: private communication in a public world, second edition
Network security: private communication in a public world, second edition
In Search of Usable Security: Five Lessons from the Field
IEEE Security and Privacy
IEEE Security and Privacy
Scientific Grid Computing: The First Generation
Computing in Science and Engineering
Security and usability engineering with particular attention to electronic mail
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Mechanisms for increasing the usability of grid security
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Life-cycle management of X.509 certificates based on LDAP directories
Journal of Computer Security - On IWAP'05
Network-in-a-box: how to set up a secure wireless network in under a minute
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
NSPW '06 Proceedings of the 2006 workshop on New security paradigms
The strengths of weaker identities: opportunistic personas
HOTSEC'07 Proceedings of the 2nd USENIX workshop on Hot topics in security
Practical security for rural internet kiosks
Proceedings of the second ACM SIGCOMM workshop on Networked systems for developing regions
Directory Based Registration in Public Key Infrastructures
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
Using a spatial context authentication proxy for establishing secure wireless connections
Journal of Mobile Multimedia
ACT: audio conference tool over named data networking
Proceedings of the ACM SIGCOMM workshop on Information-centric networking
A new approach to securing audio conference tools
AINTEC '11 Proceedings of the 7th Asian Internet Engineering Conference
For some eyes only: protecting online information sharing
Proceedings of the third ACM conference on Data and application security and privacy
Hi-index | 0.00 |
A common complaint about PKI is that it is simply too hard to use at the end-user level. Somewhat surprisingly, there exists no PKI equivalent of DHCP or BOOTP for automated, transparent PKI setup, leaving the certificate user experience similar to the process of bringing up an X.25 link. This paper provides a PKI equivalent of these basic bootstrap services that provides automatic, transparent configuration and setup of certificate information, with the user needing to supply no more than their user name and password. The work covers the design process involved and tradeoffs made, implementation details, and experiences with actual operation. The overall purpose of the work is to design and implement a plug-and-play certificate setup mechanism usable by even the most inexperienced user, a "PKI your mother can use".