2006 22nd Annual Computer Security Applications Conference (ACSAC'06) 2006
DOI: 10.1109/acsac.2006.23
|View full text |Cite
|
Sign up to set email alerts
|

Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Year Published

2008
2008
2014
2014

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(22 citation statements)
references
References 3 publications
0
22
0
Order By: Relevance
“…There are also some more complicated variants of pTAN scheme, such as 3pTAN [12] and ppTAN [11], but their usability is worse than pTAN. Solutions based on trusted proxies: Some solutions base the security on trusted proxies [23,28,41,54]. Normally the user and the trusted proxy share some secret information so that the user can input transaction data in a way secure against the MitC attacks.…”
Section: Existing Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…There are also some more complicated variants of pTAN scheme, such as 3pTAN [12] and ppTAN [11], but their usability is worse than pTAN. Solutions based on trusted proxies: Some solutions base the security on trusted proxies [23,28,41,54]. Normally the user and the trusted proxy share some secret information so that the user can input transaction data in a way secure against the MitC attacks.…”
Section: Existing Solutionsmentioning
confidence: 99%
“…Finally, solutions based on trusted proxies [23,28,41,54] and the solutions proposed in [48,57] are designed for making secure transactions on untrusted public terminal computers. In other words, these solutions work only when the user is aware of the untrustworthiness of the computer and intentionally choose to use these solutions.…”
Section: Problems With Existing Solutionsmentioning
confidence: 99%
“…Jammalamadaka [4] presents Delegate, a proxybased architecture that enables a user to access websites without disclosing personal information to untrusted machines. Delegate enforces rules at the proxy to detect and prevent session hijacking.…”
Section: Related Workmentioning
confidence: 99%
“…To secure kiosk computing environments, researchers have proposed a number of solutions [3,4,5,6,7,8,9,10,11,13,14,15,17]. Most of these solutions use a trusted mobile device such as a PDA (Personal Digital Assistant) or a mobile phone to enhance the security of kiosk computing environments, and we refer to them as PDA-based solutions.…”
Section: Introductionmentioning
confidence: 99%