Authenticated out-of-band communication over social links

Anirudh Ramachandran, Nick Feamster

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

Abstract

Many existing host-based applications rely on their own authentication mechanisms and peer discovery services. Although social networking sites already provide mechanisms for users both to discover other users (e.g., by logging on to the social network Web site) and to communicate securely with each other (e.g., using instant messages within the social networking site), today's applications have no way to exploit the relationships and trust that are inherent in these networks. This paper proposes Authenticatr, a framework that allows applications to use the authentication and peer discovery mechanisms inherent in social networking sites to bootstrap their own authenticated communication channels. We describe motivating applications, detail the interface that Authenticatr exposes to applications, and discuss practical considerations and security threats.

Original languageEnglish (US)
Title of host publicationProceedings of the ACM SIGCOMM 2008 Conference on Computer Communications -1st Workshop on Online Social Networks, WOSP'08
Pages61-66
Number of pages6
DOIs
StatePublished - 2008
EventACM SIGCOMM 2008 Conference on Computer Communications - 1st Workshop on Online Social Networks, WOSP'08 - Seattle, WA, United States
Duration: Aug 17 2008Aug 22 2008

Publication series

NameProceedings of the ACM SIGCOMM 2008 Conference on Computer Communications -1st Workshop on Online Social Networks, WOSP'08

Other

OtherACM SIGCOMM 2008 Conference on Computer Communications - 1st Workshop on Online Social Networks, WOSP'08
Country/TerritoryUnited States
CitySeattle, WA
Period8/17/088/22/08

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Keywords

  • Authentication
  • Security
  • Social networks

Fingerprint

Dive into the research topics of 'Authenticated out-of-band communication over social links'. Together they form a unique fingerprint.

Cite this