메뉴 건너뛰기




Volumn , Issue , 2009, Pages 19-28

TruWallet: Trustworthy and migratable wallet-based web authentication

Author keywords

Identity theft; Password wallet; Phishing; Secure migration; Trusted computing

Indexed keywords

AUTHENTICATION SOLUTIONS; IDENTITY THEFT; MALWARES; MIGRATION PROTOCOLS; OPERATING SYSTEMS; PHISHING; SECURITY KERNEL; SECURITY PROBLEMS; SENSITIVE DATAS; TRUSTED COMPUTING; TRUSTED COMPUTING TECHNOLOGY; VIRTUALIZATIONS; WEB APPLICATION; WEB AUTHENTICATION;

EID: 74049088125     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1655108.1655112     Document Type: Conference Paper
Times cited : (20)

References (52)
  • 1
    • 74049108810 scopus 로고    scopus 로고
    • Paros website. http://www.parosproxy.org.
    • Paros website
  • 2
    • 74049151306 scopus 로고    scopus 로고
    • ID theft ring hits 50 banks, security firm says, 2005. http: //news.cnet.com/2100-7349-3-5823591.html.
    • ID theft ring hits 50 banks, security firm says, 2005. http: //news.cnet.com/2100-7349-3-5823591.html.
  • 3
    • 74049123710 scopus 로고    scopus 로고
    • New Trojans plunder bank accounts, 2006. http: //news.cnet.com/2100-7349- 3-6041173.html.
    • New Trojans plunder bank accounts, 2006. http: //news.cnet.com/2100-7349- 3-6041173.html.
  • 4
    • 74049092910 scopus 로고    scopus 로고
    • AMD. AMD64 architecture programmer's manual 2: System programming. Technical Report Publication Number 24593, Revision 3.14, AMD, Sept. 2007.
    • AMD. AMD64 architecture programmer's manual volume 2: System programming. Technical Report Publication Number 24593, Revision 3.14, AMD, Sept. 2007.
  • 5
    • 34548344520 scopus 로고    scopus 로고
    • Anti Phishing Working Group
    • Anti Phishing Working Group. Phishing Activity Trends Report(s), 2005-2008. http://www.antiphishing.org.
    • (2005) Phishing Activity Trends Report(s)
  • 7
    • 70349233792 scopus 로고    scopus 로고
    • Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-based Single Sign-On for Google Apps
    • Hilton Alexandria Mark Center, Virginia, USA, ACM
    • A. Armando, R. Carbone, L. Compagna, J. Cuellar, and L. T. Abad. Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-based Single Sign-On for Google Apps. In 6th ACM Workshop on Formal Methods in Security Engineering (FMSE'08), pages 1-10, Hilton Alexandria Mark Center, Virginia, USA, 2008. ACM.
    • (2008) 6th ACM Workshop on Formal Methods in Security Engineering (FMSE'08) , pp. 1-10
    • Armando, A.1    Carbone, R.2    Compagna, L.3    Cuellar, J.4    Abad, L.T.5
  • 8
    • 38149014725 scopus 로고    scopus 로고
    • Enabling fairer digital rights management with trusted computing
    • 10th Information Security Conference ISC'07, Springer
    • N. Asokan, J.-E. Ekberg, A.-R. Sadeghi, C. Stüble, and M. Wolf. Enabling fairer digital rights management with trusted computing. In 10th Information Security Conference (ISC'07), LNCS vol. 4779, pages 53-70. Springer, 2007.
    • (2007) LNCS , vol.4779 , pp. 53-70
    • Asokan, N.1    Ekberg, J.-E.2    Sadeghi, A.-R.3    Stüble, C.4    Wolf, M.5
  • 9
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password-based protocols secure against dictionary attacks
    • S. M. Bellovin and M. Merritt. Encrypted key exchange: Password-based protocols secure against dictionary attacks. In IEEE Symposium on Security and Privacy (S&P'92), pages 72-84, 1992.
    • (1992) IEEE Symposium on Security and Privacy (S&P'92) , pp. 72-84
    • Bellovin, S.M.1    Merritt, M.2
  • 15
    • 70349233396 scopus 로고    scopus 로고
    • On the insecurity of microsoft's identity metasystem cardspace
    • TR-2008-004, Horst Görtz Institute for IT-Security, Ruhr-University Bochum
    • S. Gajek, J. Schwenk, and X. Chen. On the insecurity of microsoft's identity metasystem cardspace. Technical Report HGI TR-2008-004, Horst Görtz Institute for IT-Security, Ruhr-University Bochum, 2008.
    • (2008) Technical Report HGI
    • Gajek, S.1    Schwenk, J.2    Chen, X.3
  • 19
    • 50249182906 scopus 로고    scopus 로고
    • Secure web browsing with the OP web browser
    • Washington, DC, USA, IEEE Computer Society
    • C. Grier, S. Tang, and S. T. King. Secure web browsing with the OP web browser. In IEEE Symposium on Security and Privacy (S&P'08), pages 402-416, Washington, DC, USA, 2008. IEEE Computer Society.
    • (2008) IEEE Symposium on Security and Privacy (S&P'08) , pp. 402-416
    • Grier, C.1    Tang, S.2    King, S.T.3
  • 21
    • 70449464048 scopus 로고    scopus 로고
    • Intel trusted execution technology software development guide
    • Intel Corporation, 315168-005, Intel Corporation, June
    • Intel Corporation. Intel trusted execution technology software development guide. Technical Report Document Number: 315168-005, Intel Corporation, June 2008.
    • (2008) Technical Report Document Number
  • 22
    • 70449690094 scopus 로고    scopus 로고
    • Internet Crime Complaint Center
    • Internet Crime Complaint Center. 2008 Internet Crime Report. http://www.ic3.gov/media/annualreport/2008-IC3Report.pdf, 2008.
    • (2008) Internet Crime Report , pp. 2008
  • 24
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • D. P. Jablon. Strong password-only authenticated key exchange. Computer Communication Review, 26(5):5-26, 1996.
    • (1996) Computer Communication Review , vol.26 , Issue.5 , pp. 5-26
    • Jablon, D.P.1
  • 31
    • 0033719386 scopus 로고    scopus 로고
    • Risks of the passport single signon protocol
    • D. Kormann and A. Rubin. Risks of the passport single signon protocol. Computer Networks, 33(1-6):51-58, 2000.
    • (2000) Computer Networks , vol.33 , Issue.1-6 , pp. 51-58
    • Kormann, D.1    Rubin, A.2
  • 33
    • 74049164972 scopus 로고    scopus 로고
    • The new face of phishing
    • http
    • B. Krebs. The new face of phishing. Washington Post, 2006. http: //blog.washingtonpost.com/securityfix/2006/02/the-new-face-of-phishing-1.html.
    • (2006) Washington Post
    • Krebs, B.1
  • 36
    • 21644481379 scopus 로고    scopus 로고
    • Bear: An open-source virtual secure coprocessor based on TCPA
    • Technical Report TR2003-471, Department of Computer Science, Dartmouth College
    • R. Macdonald, S. Smith, J. Marchesini, and O. Wild. Bear: An open-source virtual secure coprocessor based on TCPA. Technical Report TR2003-471, Department of Computer Science, Dartmouth College, 2003.
    • (2003)
    • Macdonald, R.1    Smith, S.2    Marchesini, J.3    Wild, O.4
  • 38
    • 49849096978 scopus 로고    scopus 로고
    • SSL/TLS session-aware user authentication revisited
    • R. Oppliger, R. Hauser, and D. A. Basin. SSL/TLS session-aware user authentication revisited. Computers & Security, 27(3-4):64-70, 2008.
    • (2008) Computers & Security , vol.27 , Issue.3-4 , pp. 64-70
    • Oppliger, R.1    Hauser, R.2    Basin, D.A.3
  • 39
    • 1142301938 scopus 로고    scopus 로고
    • Analysis of liberty single-sign-on with enabled clients
    • B. Pfitzmann and M. Waidner. Analysis of liberty single-sign-on with enabled clients. IEEE Internet Computing, 7(6):38-44, 2003.
    • (2003) IEEE Internet Computing , vol.7 , Issue.6 , pp. 38-44
    • Pfitzmann, B.1    Waidner, M.2
  • 44
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a TCG-based integrity measurement architecture
    • August
    • R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In 13th USENIX Security Symposium, pages 223-238, August 2004.
    • (2004) 13th USENIX Security Symposium , pp. 223-238
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    van Doorn, L.4
  • 45
    • 84870259303 scopus 로고    scopus 로고
    • SANS Institute, November 2007
    • SANS Institute. SANS Top-20 2007 Security Risks. http://www.sans.org/ top20/2007/top20.pdf, November 2007.
    • SANS Top-20 2007 Security Risks
  • 46
    • 0033293553 scopus 로고    scopus 로고
    • Building a high-performance, programmable secure coprocessor
    • April
    • S. W. Smith and S. Weingart. Building a high-performance, programmable secure coprocessor. Computer Networks, 31(8):831-860, April 1999.
    • (1999) Computer Networks , vol.31 , Issue.8 , pp. 831-860
    • Smith, S.W.1    Weingart, S.2
  • 50
    • 77952371831 scopus 로고    scopus 로고
    • Trusted Computing Group, version 1.2 rev, July 2007
    • Trusted Computing Group. TPM main specification, version 1.2 rev. 103, July 2007. https://www.trustedcomputinggroup.org.
    • TPM main specification , pp. 103


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.