Defining Security in Primary Key Infrastructures
نویسندگان
چکیده
منابع مشابه
Maintaining security and trust in large scale public key infrastructures
In Public Key Infrastructures (PKIs), trusted Certification Authorities (CAs) issue public key certificates which bind public keys to the identities of their owners. This enables the authentication of public keys which is a basic prerequisite for the use of digital signatures and public key encryption. These in turn are enablers for ebusiness, e-government and many other applications, because t...
متن کاملWindowed Key Revocation in Public Key Infrastructures
A fundamental problem inhibiting the wide acceptance of a Public Key Infrastructure (PKI) in the Internet is the lack of a mechanism that provides scalable certificate revocation. In this paper, we propose a novel mechanism called Windowed Revocation. In windowed revocation, certificate revocation is announced for short periods in periodic Certificate Revocation Lists (CRLs). Due to the assuran...
متن کاملSoftware Security in Virtualized Infrastructures
Future infrastructures for energy, traffic, and computing will be virtualized: they will consist of decentralized, self-organizing, dynamically adaptive, and open collections of physical resources such as virtual power plants or computing clouds. Challenges to software dependability, in particular software security will be enourmous. While the problems in this domain transcend any specific inst...
متن کاملEnsuring Security in It Infrastructures
This paper reviews some of the difficulties that arise in the secureoperating system design. Then a formal framework different fromand more powerful than the existing ones in the literature has beenproposed aiming at supporting multiple security policies in moderncomputing environments. Finally, three novel models in thedifferent areas, namely the confidentiality policy mode...
متن کاملSecurity of Railway Infrastructures
In recent years, some sadly famous terrorist attacks that occurred in different countries have put into evidence that railway transportation systems are not suitably protected, and not capable of tolerating and promptly reacting to them. Moreover, it is clear that such mass transportation systems are particularly attractive for terrorists, due to the potentially far-reaching, often “spectacular...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Information Technology & Software Engineering
سال: 2017
ISSN: 2165-7866
DOI: 10.4172/2165-7866.1000214