Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture

نویسندگان

  • Stefanos Gritzalis
  • Sokratis K. Katsikas
  • Dimitrios Lekkas
  • Konstantinos Moulinos
  • Eleni Polydoro
چکیده

1University of the Aegean, Department of Information and Communication Systems, Karlovassi GR-832 00, Greece, {sgritz, ska,dlek}@aegean.gr . 2Technological Education Institute of Athens, Department of Informatics,Ag. Spiridonos St.,Aegaleo GR-122 10, Greece. 3Data Protection Commission, 8 Omirou St.,Athens GR-105 64, Greece. 4Athens University of Economics & Business, Department of Informatics, 76 Patission St.,Athens GR-104 34, Greece,{kdm, epp}@aueb.gr .

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Keystone: A Group Key Management Service

A major problem area in securing group communications is group key management. In this paper, we present the design and architecture of a scalable group key management system called Keystone. Key-stone uses a novel key graph technique for scalable group key management. In Keystone, the authentica-tion of client identity can be oooaded to one or more registrars to improve performance. For eecien...

متن کامل

Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

The term data security refers to the degree of resistance of protection given to information from unintended or unauthorized access. The core principles of information security remain the same Confidentiality, Integrity and Availability also referred as CIA triad. With cloud adoption the confidential enterprise data is moved from organization premises to untrusted public network and due to this...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

Securing Database using Public Key Infrastructure A Proposed DB PKI Architecture

Database security concerns the use of a broad range of information security controls to protect databases potentially including the data, the database applications or stored functions, the database systems, the database servers and the associated network links against compromises of their confidentiality, integrity and availability. It involves various types or categories of controls, such as t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Security

دوره 19  شماره 

صفحات  -

تاریخ انتشار 2000