Certification Authorities in a Global Network - Procedures and Guidelines for a Public Key Infrastructure

نویسندگان

  • Denis Trcek
  • Borka Jerman-Blazic
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Certification Infrastructure Reference Procedures

Implementations of security services in a global network are strongly based on asymmetric cryptography, which in turn depends on a public key certification infrastructure. Its properties and behaviour should prevent threats. Moreover, the infrastructure should be efficiently manageable and it should meet users' expectations regarding trust. Flexible guidelines and procedures are given in this p...

متن کامل

Web PKI: Closing the Gap between Guidelines and Practices

A string of recent attacks against the global public key infrastructure (PKI) has brought to light weaknesses in the certification authority (CA) system. In response, the CA/Browser Forum, a consortium of certification authorities and browser vendors, published in 2011 a set of requirements applicable to all certificates intended for use on the Web and issued after July 1st, 2012, following the...

متن کامل

Distributed Storage and Revocation in Digital Certificate Databases

Public-key cryptography is fast becoming the foundation for those applications that require security and authentication in open networks. But the widespread use of a global public-key cryptosystem requires that public-key certificates are always available and up-to-date. Problems associated to digital certificates management, like storage, retrieval, maintenance, and, specially, revocation, req...

متن کامل

PKI and digital certification infrastructure

Secure VPN technology is only possible with the use of appropriate security systems such as encryption, digital signatures, digital certificates, public/private key pairs, non-repudiation, and time-stamping. A PKI comprises a system of certificates, certificate authorities, subjects, relying partners, registration authorities, and key repositories that provide for safe and reliable communicatio...

متن کامل

Distributed PKI in P2P Networks

Internet security today is based almost entirely on a public key infrastructure that allows authentication and encryption of data. However this PKI heavily relies on central institutions, namely the Certification Authorities (CAs), that issue certificates. In pure P2P networks such central instances are unwanted because they contradict the P2P paradigms. In this paper, we describe how a Certifi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Australian Computer Journal

دوره 29  شماره 

صفحات  -

تاریخ انتشار 1997