Security

MI: Cross-Layer Malleable Identity

Free registration required

Executive Summary

Access to Internet services is granted based on application-layer user identities, which also offer accountability. The revered layered network model dictates a disparate network-layer identity scheme for systems. The authors challenge this religious layered model adherence by demonstrating the practical benefits derived from a cross-layer identity scheme. Instead of a rigid identity, their Malleable Identity (MI) scheme empowers a traffic originator to fine-tune, on a per-case basis if necessary, her 3rd-party issued identity attributes embedded in an Identity Voucher (IV). When tagged to traffic, IVs benefit users, the Internet and services.

  • Format: PDF
  • Size: 116 KB