Dynamic Validity Period Calculation of Digital Certificates Based on Aggregated Security Assessment
نویسندگان
چکیده
The paper proposes a method based on different security-related factors to dynamically calculate the validity period of digital certificates. Currently validity periods are most often defined statically without scientific justification. This approach is not sufficient to objectively consider the actual need for security. Therefore the approach proposed in this paper considers relevant security criteria in order to calculate a meaningful validity period for digital certificates. This kind of security assessment can be executed periodically in order to dynamically respond to changing conditions. Especially in the context of complex systems and infrastructures that have an increased need for security, privacy and availability this issue is highly relevant.
منابع مشابه
A Java API for X.509 Proxy Certificates
X.509 Proxy Certificates have been proposed for use in the Grid Security Infrastructure to allow dynamic delegation of rights and single sign-on for end users. We have evaluated proxy certificates to secure a service-oriented architecture for digital content based on Web Services. We describe how support for proxy certificates was implemented in Java through extensions to the Java Cryptography ...
متن کاملReasoning about Attribute Authenticity in a Web Environment
The reliable authentication of user attributes is an important prerequisite for the security of web based applications. Digital certificates are widely used for that purpose. However, practical certification scenarios can be very complex. Each certificate carries a validity period and can be revoked during this period. Furthermore, the verifying user has to trust the issuers of certificates and...
متن کاملA Novel Index for Online Voltage Stability Assessment Based on Correlation Characteristic of Voltage Profiles
Abstract: Voltage instability is a major threat for security of power systems. Preserving voltage security margin at a certain limit is a vital requirement for today’s power systems. Assessment of voltage security margin is a challenging task demanding sophisticated indices. In this paper, for the purpose of on line voltage security assessment a new index based on the correlation characteristic...
متن کاملChains of Distrust: Towards Understanding Certificates Used for Signing Malicious Applications
Digital certificates are key component of trust used by many operating systems. Modern operating systems implement a form of digital signature verification for various applications, including kernel driver installation, software execution, etc. Digital signatures rely on digital certificates that authenticate the signature, which then verify the validity of a given signature for a signed binary...
متن کاملAssessment of ATC Using Voltage and Transient Stability, Simultaneously
Methods for calculating Available Transfer Capability (ATC) of the transmission systems may be grouped under Static and Dynamic methods. This paper presents a fast dynamic method for ATC calculations, which considers both Transient Stability Limits and Voltage Stability Limits as terminating criteria. A variation of Energy Function Method is used to determine the transient stability limit and t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012