Certification Authorities in a Global Network - Procedures and Guidelines for a Public Key Infrastructure
نویسندگان
چکیده
منابع مشابه
Certification Infrastructure Reference Procedures
Implementations of security services in a global network are strongly based on asymmetric cryptography, which in turn depends on a public key certification infrastructure. Its properties and behaviour should prevent threats. Moreover, the infrastructure should be efficiently manageable and it should meet users' expectations regarding trust. Flexible guidelines and procedures are given in this p...
متن کاملWeb PKI: Closing the Gap between Guidelines and Practices
A string of recent attacks against the global public key infrastructure (PKI) has brought to light weaknesses in the certification authority (CA) system. In response, the CA/Browser Forum, a consortium of certification authorities and browser vendors, published in 2011 a set of requirements applicable to all certificates intended for use on the Web and issued after July 1st, 2012, following the...
متن کاملDistributed Storage and Revocation in Digital Certificate Databases
Public-key cryptography is fast becoming the foundation for those applications that require security and authentication in open networks. But the widespread use of a global public-key cryptosystem requires that public-key certificates are always available and up-to-date. Problems associated to digital certificates management, like storage, retrieval, maintenance, and, specially, revocation, req...
متن کاملPKI and digital certification infrastructure
Secure VPN technology is only possible with the use of appropriate security systems such as encryption, digital signatures, digital certificates, public/private key pairs, non-repudiation, and time-stamping. A PKI comprises a system of certificates, certificate authorities, subjects, relying partners, registration authorities, and key repositories that provide for safe and reliable communicatio...
متن کاملDistributed PKI in P2P Networks
Internet security today is based almost entirely on a public key infrastructure that allows authentication and encryption of data. However this PKI heavily relies on central institutions, namely the Certification Authorities (CAs), that issue certificates. In pure P2P networks such central instances are unwanted because they contradict the P2P paradigms. In this paper, we describe how a Certifi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Australian Computer Journal
دوره 29 شماره
صفحات -
تاریخ انتشار 1997