Results 261 to 270 of about 323,861 (306)
Some of the next articles are maybe not open access.

Approach to analysis of certification authorities

2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS), 2017
This article considers the selection of companies that provide services of quality management systems certification. The choice of companies for product certification is a very important decision that will affect the reputation of the organization. To select such a company, it is necessary to take into account a large number of indicators.
Y. Klochkov   +4 more
openaire   +1 more source

Evaluating Intrusion‐Tolerant Certification Authority Systems

Quality and Reliability Engineering International, 2011
Various intrusion‐tolerant certification authority (CA) systems have been proposed to provide attack resilient certificate signing (or update) services. However, it is difficult to compare them against each other directly, due to the diversity in system organizations, threshold signature schemes, protocols and usage scenarios.
Jingqiang Lin, Jiwu Jing, Peng Liu
openaire   +1 more source

Modeling Security Bridge Certificate Authority Architecture

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2009
Current Public Key Infrastructures suffer from a scaling problem, and some may have security problems, even given the topological simplification of bridge certification authorities. This paper analyzes the security problems in Bridge Certificate Authorities (BCA) model by using the concept of "impersonation risk," and proposes a new modified BCA model,
Yizhi REN, Mingchu LI, Kouichi SAKURAI
openaire   +1 more source

Formulation of Certificate Policy and Certification Practice Statement Framework for Subordinate Certification Authorities Indonesia

2016 International Conference on Information Science and Security (ICISS), 2016
Certificate Policy (CP) and Certification Practice Statement (CPS) are mandatory documents for Subordinate Certification Authorities (Sub-CAs) to explain their process business in Indonesia National Public Key Infrastructure (INPKI). Due to Sub-CAs' low proficiency in preparing CP and CPS, Ministry of Communication and Information Technology (MCIT ...
Arfive Gandhi   +2 more
openaire   +1 more source

Author’s certificate “Gearbox”

TEKHNOPARK.RF, 2021
N.O. Korolev   +2 more
openaire   +1 more source

Author’s certificate “Clutch”

TEKHNOPARK.RF, 2021
A.R. Shakirov   +2 more
openaire   +1 more source

Autonomous Decentralized Root Certification Authority System

2009 29th IEEE International Conference on Distributed Computing Systems Workshops, 2009
A Public Key Infrastructure (PKI) is a set of elements and procedures needed to create, store, manage, distribute and revoke digital certificates. Its main objective is to bind public keys with respective user identities assuring the uniqueness of these public keys.A PKI must guarantee the reliability of its services, assuring the timeliness of its ...
Luis Carlos Coronado-Garcia   +2 more
openaire   +1 more source

TLS with trustworthy certificate authorities

2016 IEEE Conference on Communications and Network Security (CNS), 2016
Cloud platforms can leverage Trusted Platform Modules to help provide assurance to clients that cloud-based web services are trustworthy and behave as expected. We discuss a variety of approaches to providing this assurance, and we implement one approach based on the concept of a trustworthy certificate authority.
openaire   +1 more source

Certification Authority

2011
Carlisle Adams   +2 more
openaire   +2 more sources

Authors' certificates

Refractories, 1973
A. N. Chernov, A. N. Abyzov
openaire   +1 more source

Home - About - Disclaimer - Privacy