Results 251 to 260 of about 323,861 (306)
Some of the next articles are maybe not open access.
A Call to Reconsider Certification Authority Authorization
IEEE Security & PrivacyPouyan Fotouhi Tehrani +3 more
openaire +3 more sources
Analysis of Counterfactual Quantum Certificate Authorization
International Journal of Theoretical Physics, 2016zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Wang, Tian-Yin +2 more
openaire +2 more sources
Security issues with certificate authorities
2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), 2017The current state of the internet relies heavily on SSL/TLS and the certificate authority model. This model has systematic problems, both in its design as well as its implementation. There are problems with certificate revocation, certificate authority governance, breaches, poor security practices, single points of failure and with root stores.
Jake A. Berkowsky, Thaier Hayajneh
openaire +1 more source
Empowered Certification Authority in VANETs
2009 International Conference on Advanced Information Networking and Applications Workshops, 2009The current research on privacy assurance in Vehicular Ad hoc Networks (VANETs) by pseudonym generation and network accountability through revocation has not achieved the desired results. Our research has identified the problems associated with the current techniques. We have revisited the pseudonym generation concept to address the privacy need of the
Akhlaq, Monis +4 more
openaire +2 more sources
Evaluating certification authority security
1998 IEEE Aerospace Conference Proceedings (Cat. No.98TH8339), 2002A growing number of applications in the Internet are making use of X.509 public key certificates. Examples include security protocols such as SSL (used in web browsers), IPsec (used in firewalls and desktop computers), S/MIME (a secure e-mail protocol), and SET (the electronic commerce credit card transaction protocol).
openaire +1 more source
Certificate based authorization simulation system
25th Annual International Computer Software and Applications Conference. COMPSAC 2001, 2002Using certificates for distributed authorizations in computer network systems has been discussed in the literature. However real implementations of the concept are rarely seen. In our certificate based authorization simulation system (CBASS) project, we prototyped a computer system including some of the emulated functions of an operating system such as
J. Dai, J. Alves-Foss
openaire +1 more source
DNS Certification Authority Authorization (CAA) Resource Record
2019The Certification Authority Authorization (CAA) DNS Resource Record allows a DNS domain name holder to specify one or more Certification Authorities (CAs) authorized to issue certificates for that domain. CAA Resource Records allow a public Certification Authority to implement additional controls to reduce the risk of unintended certificate mis-issue ...
P. Hallam-Baker +2 more
openaire +1 more source
A merging method of certification authorities without using cross-certifications
18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004., 2004The public key infrastructure (PKI) technology is very important to support secure global electronic commerce and digital communications on networks. In electronic commerce, different PKIs need to be interoperated. Especially, they need to be merged for merger and acquisition of companies.
S. Koga, K. Sakurai
openaire +1 more source
Certification Authority Liability Analysis
SSRN Electronic Journal, 1998This paper surveys the liability issues raised by an entity’s entry into the certification authority business. Because the duties and potential liabilities imposed upon a CA by applicable law are unclear, this paper addresses the major sources of U.S.
openaire +1 more source
Certification Authorities Under Attack: A Plea for Certificate Legitimation
IEEE Internet Computing, 2014Several recent attacks against certification authorities (CAs) and fraudulently issued certificates have put the security and usefulness of the Internet public-key infrastructure (PKI) at stake. In this article, the author argues that such attacks are likely to occur repeatedly and that respective countermeasures must be designed, implemented, and put ...
openaire +1 more source

