advantage is that (unlike traditional biometric
methods) there is no need to generate a client
template from a presented biometric. The method is
still emerging from the research literature and has
not been specifically tailored for e-banking use.
Rather, limited trials and test-beds have
demonstrated proof-of-concept results using voice
speech samples (Wisse, 2006). The semiotic
paradigm has offered little support for identity
management. Only Wisse (Athan and Howells,
2009) has offered a theoretical extension to Peirce's
triadic model of semiosis to take into account the
additional complexities of mapping a biological
identity to virtual identities. We go on to ground our
contribution within a semiotic analytic approach to
trusted authentication. This can be seen as a natural
extension to a generic semiotic account of an E-trust
framework most recently articulated within French
(French, 2009).
2 IDENTITY MANAGEMENT:
A SEMIOTIC ANALYSIS
Previously one of us has suggested that a novel trust
ladder a novel and tailored variant of Stamper's well
known semiotic ladder (Stamper, 1973) can prove to
be invaluable conceptual tool to clarify matters of
trust and security issues in the context of e-bank
web-site design as well as in the context of SSL/TLS
client-server exchanges (Bacharach and Gambetta,
1997).
Semiotic trust ladder
Social world, organisational trust:
Beliefs and reputation. Trust as expectations
Organisational trust, social capital
Pragmatics of trust:
Goals, intentions, trusted negotiations, trusted
communications
e-service consumption & provision
Semantics of trust:
Meanings, truth/falsehood, validity
e.g. deception and mimicry on a web-site home-
page
Syntactics of trust:
Formalisms, tangible security, trusted access to
data, files, software
e.g. PKI, X.509 certificates
Empiric trust:
Cryptographic ciphers, entropy, channel
capacity, e.g. RSA
Figure 1: A “Universal” e-service semiotic trust ladder.
For each of the layers of the semiotic trust ladder (a
close variant of Stamper’s famous ladder) an
exemplar security/trust aspect is indicated. Clearly
the development of a semiotics of security and trust
forms a much larger research agenda. This task lies
outside the scope of the present paper, though this
paper forms a minor contribution to this research
agenda. Indeed, that the ladder may prove to be
useful in the analysis and classification of e-banking
user authentication methods and hence establish a
kind of taxonomy of identity management that we
coin as Sign Based Identity Management (SBIM).
SBIM is intended to reveal the inherent
characteristics and vulnerabilities of well known
user authentication methods used by e-banks and
seek to map these to the various layers of the
semiotic trust ladder. The trust ladder is reproduced
as Figure 1 above.
We suggest that the ladder may prove to be useful in
the analysis and classification of e-banking user
authentication methods and hence establish a kind of
taxonomy of identity management. SBIM is
intended to reveal the inherent characteristics and
vulnerabilities of well known user authentication
methods used by e-banks and seek to map these to
the various layers of the semiotic trust ladder.
Tables 1 and 2 that follow present a tentative
mapping of key user authentication methods to signs
and signal exchanges and known vulnerabilities.
This mapping effectively re-factors authentication in
terms of the signs and signals being exchanged. It
can be seen in Table 1 below that traditional
methods suffer from well known weaknesses of
social engineering whilst the low adoption of one-
time passwords suggests user resistance to adoption.
Credentials such as smart cards and chip-and-pin
cards suffer from problems of 'cloning' and also
offer the possibility of a user presenting such
credentials under duress. It has recently been
suggested that the optimal (future) method of initial
registration identity verification in an EU context
may be the use of EU ID cards (Naumann, 2009).
Such credentials may be relatively easy to clone.
Table 1, contains an entry marked 'template free'
biometrics. We later seek to demonstrate
applicability to e-banking user registration and site
usage through the use of a use case based overview,
with supportive mathematical underpinning. SBIM's
"added value" is to seek to reveal clearly that every
method has known weaknesses and that these are
related to the nature of the signs being exchanged at
various levels of the trust ladder.
ICISO 2010 - International Conference on Informatics and Semiotics in Organisations
112