Skip to main content

Binding bit patterns to real world entities

  • Conference paper
  • First Online:
Security Protocols (Security Protocols 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1361))

Included in the following conference series:

Abstract

Public key cryptography is often used to verify the integrity of a piece of data, or more generally to ensure that operations which modify the data have been requested and carried out by principals who are authorized to do so. This requires keys to be bound to principals in an unforgetably verifiable manner.

Cryptographic bit patterns such as electronic key certificates (EKCs) have a part to play in establishing such bindings, but the requirement ultimately to bind keys to real world entities imposes subtle constraints upon the structure and semantics of EKCs and related entities such as ACLs and capabilities, and upon the role which such entities may play in access control and integrity verification. These do not appear to be adequately realized at present.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ellison, C.M., 1996, Establishing Identity without Certification Authorities, Sixth USENIX Security Symposium Proceedings 67-76

    Google Scholar 

  2. Ellison, C.M., Frantz, B. and Thomas, B.M., 1996, Simple Public Key Certificate, http://www.clark.net/pub/cme/

    Google Scholar 

  3. Harbison, W.S., 1997, Trusting in Computer Systems, PhD thesis, Computer Laboratory, University of Cambridge

    Google Scholar 

  4. Lek, H. van der, Bakema, G.P. and Zwart, J.P.C., 1992, De Unificatie van Object-typen en Feittypen een Pracktisch en Diadactisch Vruchtbare Theorie (Unifying Object Types and Fact Types: A Practically and Didactically Productive Theory), Informatie 34(5) 279–295

    Google Scholar 

  5. Low, M.R. and Christianson, B., 1994, Self Authenticating Proxies, The Computer Journal 37(5) 422–428

    Article  Google Scholar 

  6. Needham, R., 1997, The changing Environment for Security Protocols, IEEE Network 11(3) 12–15

    Article  Google Scholar 

  7. Rivest, R.L. and Lampson, B., 1996, SDSI-A Simple Distributed Security Infrastructure, http://theory.Ics.mit.edu/~rivest/

    Google Scholar 

  8. Snook, J.F., 1992, Towards Secure Optimistic Distributed Open Systems, PhD thesis, University of Hertfordshire: Hatfield

    Google Scholar 

  9. Roe, M., 1997, Cryptography and Evidence, PhD thesis, Computer Laboratory, University of Cambridge

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Bruce Christianson Bruno Crispo Mark Lomas Michael Roe

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Christianson, B., Malcolm, J.A. (1998). Binding bit patterns to real world entities. In: Christianson, B., Crispo, B., Lomas, M., Roe, M. (eds) Security Protocols. Security Protocols 1997. Lecture Notes in Computer Science, vol 1361. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028163

Download citation

  • DOI: https://doi.org/10.1007/BFb0028163

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64040-0

  • Online ISBN: 978-3-540-69688-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics