{"id":"https://openalex.org/W1978331206","doi":"https://doi.org/10.1145/2666141.2668385","title":"Challenges of Establishing Trust in Online Entities and Beyond","display_name":"Challenges of Establishing Trust in Online Entities and Beyond","publication_year":2014,"publication_date":"2014-11-03","ids":{"openalex":"https://openalex.org/W1978331206","doi":"https://doi.org/10.1145/2666141.2668385","mag":"1978331206"},"language":"en","primary_location":{"id":"doi:10.1145/2666141.2668385","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2666141.2668385","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Workshop on Trustworthy Embedded Devices","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062754827","display_name":"Tiffany Hyun\u2010Jin Kim","orcid":null},"institutions":[{"id":"https://openalex.org/I200576644","display_name":"HRL Laboratories (United States)","ror":"https://ror.org/05p7te762","country_code":"US","type":"company","lineage":["https://openalex.org/I200576644"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tiffany Hyun-Jin Kim","raw_affiliation_strings":["HRL Laboratories, Malibu, CA, USA","HRL Laboratories, , Malibu, CA, USA"],"affiliations":[{"raw_affiliation_string":"HRL Laboratories, Malibu, CA, USA","institution_ids":["https://openalex.org/I200576644"]},{"raw_affiliation_string":"HRL Laboratories, , Malibu, CA, USA","institution_ids":["https://openalex.org/I200576644"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5062754827"],"corresponding_institution_ids":["https://openalex.org/I200576644"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15797969,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"49","last_page":"49"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/public-key-infrastructure","display_name":"Public key infrastructure","score":0.8284468054771423},{"id":"https://openalex.org/keywords/trust-anchor","display_name":"Trust anchor","score":0.7295165657997131},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7069504857063293},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.688014566898346},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6876063942909241},{"id":"https://openalex.org/keywords/computational-trust","display_name":"Computational trust","score":0.619458019733429},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5952860116958618},{"id":"https://openalex.org/keywords/certificate-authority","display_name":"Certificate authority","score":0.588192343711853},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5829561948776245},{"id":"https://openalex.org/keywords/public-key-certificate","display_name":"Public key certificate","score":0.5675708055496216},{"id":"https://openalex.org/keywords/express-trust","display_name":"Express trust","score":0.562153697013855},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5486380457878113},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.519124448299408},{"id":"https://openalex.org/keywords/online-identity","display_name":"Online identity","score":0.49796414375305176},{"id":"https://openalex.org/keywords/web-of-trust","display_name":"Web of trust","score":0.49246010184288025},{"id":"https://openalex.org/keywords/certificate","display_name":"Certificate","score":0.49211186170578003},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.47147631645202637},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.44130900502204895},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.42658284306526184},{"id":"https://openalex.org/keywords/casual","display_name":"Casual","score":0.4120196998119354},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.41153645515441895},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.16815251111984253},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.09261572360992432},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.08829936385154724}],"concepts":[{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.8284468054771423},{"id":"https://openalex.org/C154800190","wikidata":"https://www.wikidata.org/wiki/Q16941470","display_name":"Trust anchor","level":4,"score":0.7295165657997131},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7069504857063293},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.688014566898346},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6876063942909241},{"id":"https://openalex.org/C160521178","wikidata":"https://www.wikidata.org/wiki/Q5157345","display_name":"Computational trust","level":3,"score":0.619458019733429},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5952860116958618},{"id":"https://openalex.org/C93636275","wikidata":"https://www.wikidata.org/wiki/Q196776","display_name":"Certificate authority","level":4,"score":0.588192343711853},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5829561948776245},{"id":"https://openalex.org/C167529545","wikidata":"https://www.wikidata.org/wiki/Q274758","display_name":"Public key certificate","level":4,"score":0.5675708055496216},{"id":"https://openalex.org/C76144217","wikidata":"https://www.wikidata.org/wiki/Q5421695","display_name":"Express trust","level":2,"score":0.562153697013855},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5486380457878113},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.519124448299408},{"id":"https://openalex.org/C2780542009","wikidata":"https://www.wikidata.org/wiki/Q1091147","display_name":"Online identity","level":3,"score":0.49796414375305176},{"id":"https://openalex.org/C157424077","wikidata":"https://www.wikidata.org/wiki/Q1928707","display_name":"Web of trust","level":4,"score":0.49246010184288025},{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.49211186170578003},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.47147631645202637},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.44130900502204895},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.42658284306526184},{"id":"https://openalex.org/C2781426162","wikidata":"https://www.wikidata.org/wiki/Q2275793","display_name":"Casual","level":2,"score":0.4120196998119354},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.41153645515441895},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.16815251111984253},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.09261572360992432},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.08829936385154724},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2666141.2668385","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2666141.2668385","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Workshop on Trustworthy Embedded Devices","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5899999737739563,"display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G2424025677","display_name":null,"funder_award_id":"CCF-0424422, CNS-1040801","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"},{"id":"https://openalex.org/G6983391936","display_name":null,"funder_award_id":"CCF-0424422, CNS-1040801","funder_id":"https://openalex.org/F4320337387","funder_display_name":"Division of Computing and Communication Foundations"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320337387","display_name":"Division of Computing and Communication Foundations","ror":"https://ror.org/01mng8331"},{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W2099175354","https://openalex.org/W2255679515","https://openalex.org/W2257997238","https://openalex.org/W2294157280"],"related_works":["https://openalex.org/W2545277503","https://openalex.org/W2129384262","https://openalex.org/W2563233917","https://openalex.org/W1845088154","https://openalex.org/W2101340738","https://openalex.org/W2810582408","https://openalex.org/W2127807338","https://openalex.org/W2587062340","https://openalex.org/W2106097339","https://openalex.org/W1978331206"],"abstract_inverted_index":{"In":[0],"today's":[1],"Internet,":[2],"authenticating":[3],"online":[4,47,156,170,266,271],"entities":[5,117,142,219,234],"is":[6,76,92],"challenging":[7],"since":[8],"people":[9],"lack":[10],"the":[11,36,68,74,83,119,194,204,207,280],"real-world":[12],"cues":[13],"upon":[14],"which":[15,255],"to":[16,108,154,202,254,287,291],"base":[17],"their":[18,225],"context-dependent":[19,111,263],"trust":[20,112,166,197,215,269,294],"decisions.":[21,295],"For":[22],"example,":[23],"how":[24,58],"can":[25,41,59,105,257,261],"a":[26,30,45,60,79,95,159,221,242],"user":[27,61],"confirm":[28],"that":[29,82,101,135,192,218,233],"Facebook":[31],"invitation":[32],"truly":[33,288],"originates":[34],"from":[35],"claimed":[37],"sender,":[38],"as":[39,67],"anyone":[40],"trivially":[42],"set":[43],"up":[44],"bogus":[46],"identity":[48,122,130],"with":[49],"someone":[50],"else's":[51],"photo?":[52],"Given":[53],"an":[54,129],"SSL":[55],"certificate":[56,69,75],"warning,":[57],"validate":[62],"it":[63,91],"be-":[64],"fore":[65],"proceeding,":[66],"could":[70],"be":[71],"legitimate":[72,80],"(e.g.,":[73,90],"signed":[77,93],"by":[78,94],"authority":[81],"browser":[84],"does":[85],"not":[86],"recognize)":[87],"or":[88],"malicious":[89],"compromised":[96],"CA)?":[97],"This":[98],"talk":[99],"demonstrates":[100],"providing":[102],"useful":[103],"evidence":[104,253],"empower":[106,289],"users":[107,153,248,290],"make":[109,262,292],"informed":[110,293],"decisions":[113,265],"regarding":[114],"previously":[115,168],"unknown":[116,169],"in":[118,158,167,198,270],"context":[120],"of":[121,140,196,206,245,252,279],"and":[123,146,161,164,185,212,228,230,240,267,283],"public-key":[124,176,226],"authentication.":[125],"We":[126,172],"first":[127],"introduce":[128,174],"authentication":[131,264],"logic":[132],"called":[133,179],"RelationGram":[134,150],"visualizes":[136],"interpersonal":[137],"tie":[138],"strength":[139],"virtual":[141],"using":[143],"both":[144],"physical":[145],"social":[147],"proximities":[148],"[2,4].":[149],"enables":[151],"casual":[152],"authenticate":[155],"identities":[157],"safe":[160],"easy":[162],"manner,":[163],"build":[165,268],"entities.":[171,272],"then":[173],"new":[175],"validation":[177],"proposals":[178],"Accountable":[180],"Key":[181],"Infrastructure":[182,189],"(AKI)":[183],"[3]":[184],"Attack":[186],"Resilient":[187],"Public-Key":[188],"(ARPKI)":[190],"[1]":[191],"reduce":[193],"amount":[195],"any":[199],"single":[200,243],"entity":[201],"improve":[203],"resilience":[205],"current":[208],"PKI":[209],"systems.":[210],"AKI":[211],"ARPKI":[213],"support":[214],"agility":[216],"such":[217,232],"select":[220],"security":[222],"policy":[223],"for":[224,238],"certificates,":[227],"checks":[229],"balances":[231],"monitor":[235],"each":[236],"other":[237],"misbehavior":[239],"prevent":[241],"point":[244],"failure.":[246],"When":[247],"are":[249],"given":[250],"pieces":[251],"they":[256,260],"easily":[258],"relate,":[259],"As":[273],"concluding":[274],"remarks,":[275],"we":[276],"highlight":[277],"some":[278],"remaining":[281],"challenges":[282],"future":[284],"research":[285],"directions":[286]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
