Failure points in the PKI architecture
نویسندگان
چکیده
منابع مشابه
Experimental DRM Architecture Using Watermarking and PKI
This paper describes an experimental digital rights management architecture which uses digital watermarking and encryption to protect the content. In addition to cryptographically protected media content, the deliverable package can also include a teaser that the user is allowed to consume freely. The content is identified with an attack-resistant watermark that is used to automatically acquire...
متن کاملFeasibility of using smartphones in the reconstruction of the interior architecture of the building without using interior control points
The limitation of land in big cities has caused the vertical growth of cities; for example, high-rise buildings on the ground and underground urban facilities can be mentioned. This restriction has increased the value of land in cities, and on the other hand, it has created some new and complicated technical and legal aspects in the cadastral issues. To respond to these new technical and legal ...
متن کاملSurrogate end points in heart failure.
Because of the increasing number of pharmacologic strategies available for treatment of heart failure (HF), the time has come to reassess the adequacy of end points used to evaluate therapeutic efficacy. Interest in the use of surrogate end points in clinical studies is increasing. A surrogate end point is defined as a measurement that can substitute for a true end point for the purpose of comp...
متن کاملPKI Registration
PKI is comprised of many components: technical infrastructure, policies, procedures, and people. Initial registration of subscribers (users, organizations, hardware, or software) for a PKI service has many facets, pertaining to almost every one of the PKI components. There are many steps between the moment when subscribers apply for PKI certificates and the final state, when keys have been gene...
متن کاملSimple PKI
In this paper we discuss the SPKI standard as an alternative to the current X.509 and OpenPGP standards. The paper starts with a short history of PKI, and assesses the current state and the various flaws in the X.509 and OpenPGP standards. Then the main part of this paper explains the concepts of SPKI, and discusses how SPKI supports various notions of trust. Finally the paper concludes with an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Vojnotehnicki glasnik
سال: 2017
ISSN: 0042-8469,2217-4753
DOI: 10.5937/vojtehg65-11144