Hierarchical Organization of Certification Authorities for Secure Environments

نویسندگان

  • Lourdes López-Santidrián
  • Justo Carracedo Gallardo
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CAs Infrastructure for Secure Open Communications

This work proposes a Certification Authorities organization in order to achieve secure open communications. The report considers current international ongoing works as well as existing practices. Actually, our work tries to solve the present shortcomings when trying to organize a hierarchical CAs structure based on a naming hierarchy. The proposal focuses in the idea of having certification and...

متن کامل

A Secure Architecture for Mobile Ad Hoc Networks

In this paper, we propose a new architecture based on an efficient trust model and clustering algorithm in order to distribute a certification authority (CA) for ensuring the distribution of certificates in each cluster. We use the combination of fully self-organized security for trust model like PGP adapted to ad-hoc technology and the clustering algorithm which is based on the use of trust an...

متن کامل

SFS-HTTP: Securing the Web with Self-Certifying URLs

The current solution to secure Web communication is SSL which relies on certificate authorities for key management, limiting the ability for individuals to independently set up secure Web sites and forcing them to trust a small number of third parties. We propose a new model for Web security— SFS-HTTP—based on SFS. While SFS uses self-certifying pathnames to separate key management from file sy...

متن کامل

PKI and digital certification infrastructure

Secure VPN technology is only possible with the use of appropriate security systems such as encryption, digital signatures, digital certificates, public/private key pairs, non-repudiation, and time-stamping. A PKI comprises a system of certificates, certificate authorities, subjects, relying partners, registration authorities, and key repositories that provide for safe and reliable communicatio...

متن کامل

Authorization models for secure information sharing: a survey and research agenda

This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997