Results 261 to 270 of about 323,861 (306)
Some of the next articles are maybe not open access.
Approach to analysis of certification authorities
2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS), 2017This article considers the selection of companies that provide services of quality management systems certification. The choice of companies for product certification is a very important decision that will affect the reputation of the organization. To select such a company, it is necessary to take into account a large number of indicators.
Y. Klochkov +4 more
openaire +1 more source
Evaluating Intrusion‐Tolerant Certification Authority Systems
Quality and Reliability Engineering International, 2011Various intrusion‐tolerant certification authority (CA) systems have been proposed to provide attack resilient certificate signing (or update) services. However, it is difficult to compare them against each other directly, due to the diversity in system organizations, threshold signature schemes, protocols and usage scenarios.
Jingqiang Lin, Jiwu Jing, Peng Liu
openaire +1 more source
Modeling Security Bridge Certificate Authority Architecture
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2009Current Public Key Infrastructures suffer from a scaling problem, and some may have security problems, even given the topological simplification of bridge certification authorities. This paper analyzes the security problems in Bridge Certificate Authorities (BCA) model by using the concept of "impersonation risk," and proposes a new modified BCA model,
Yizhi REN, Mingchu LI, Kouichi SAKURAI
openaire +1 more source
2016 International Conference on Information Science and Security (ICISS), 2016
Certificate Policy (CP) and Certification Practice Statement (CPS) are mandatory documents for Subordinate Certification Authorities (Sub-CAs) to explain their process business in Indonesia National Public Key Infrastructure (INPKI). Due to Sub-CAs' low proficiency in preparing CP and CPS, Ministry of Communication and Information Technology (MCIT ...
Arfive Gandhi +2 more
openaire +1 more source
Certificate Policy (CP) and Certification Practice Statement (CPS) are mandatory documents for Subordinate Certification Authorities (Sub-CAs) to explain their process business in Indonesia National Public Key Infrastructure (INPKI). Due to Sub-CAs' low proficiency in preparing CP and CPS, Ministry of Communication and Information Technology (MCIT ...
Arfive Gandhi +2 more
openaire +1 more source
Autonomous Decentralized Root Certification Authority System
2009 29th IEEE International Conference on Distributed Computing Systems Workshops, 2009A Public Key Infrastructure (PKI) is a set of elements and procedures needed to create, store, manage, distribute and revoke digital certificates. Its main objective is to bind public keys with respective user identities assuring the uniqueness of these public keys.A PKI must guarantee the reliability of its services, assuring the timeliness of its ...
Luis Carlos Coronado-Garcia +2 more
openaire +1 more source
TLS with trustworthy certificate authorities
2016 IEEE Conference on Communications and Network Security (CNS), 2016Cloud platforms can leverage Trusted Platform Modules to help provide assurance to clients that cloud-based web services are trustworthy and behave as expected. We discuss a variety of approaches to providing this assurance, and we implement one approach based on the concept of a trustworthy certificate authority.
openaire +1 more source

