Results 301 to 310 of about 322,522 (351)
Some of the next articles are maybe not open access.

A merging method of certification authorities without using cross-certifications

18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004., 2004
The public key infrastructure (PKI) technology is very important to support secure global electronic commerce and digital communications on networks. In electronic commerce, different PKIs need to be interoperated. Especially, they need to be merged for merger and acquisition of companies.
S. Koga, K. Sakurai
openaire   +1 more source

Certification Authority Liability Analysis

SSRN Electronic Journal, 1998
This paper surveys the liability issues raised by an entity’s entry into the certification authority business. Because the duties and potential liabilities imposed upon a CA by applicable law are unclear, this paper addresses the major sources of U.S.
openaire   +1 more source

Certification Authorities Under Attack: A Plea for Certificate Legitimation

IEEE Internet Computing, 2014
Several recent attacks against certification authorities (CAs) and fraudulently issued certificates have put the security and usefulness of the Internet public-key infrastructure (PKI) at stake. In this article, the author argues that such attacks are likely to occur repeatedly and that respective countermeasures must be designed, implemented, and put ...
openaire   +1 more source

Approach to analysis of certification authorities

2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS), 2017
This article considers the selection of companies that provide services of quality management systems certification. The choice of companies for product certification is a very important decision that will affect the reputation of the organization. To select such a company, it is necessary to take into account a large number of indicators.
Y. Klochkov   +4 more
openaire   +1 more source

Evaluating Intrusion‐Tolerant Certification Authority Systems

Quality and Reliability Engineering International, 2011
Various intrusion‐tolerant certification authority (CA) systems have been proposed to provide attack resilient certificate signing (or update) services. However, it is difficult to compare them against each other directly, due to the diversity in system organizations, threshold signature schemes, protocols and usage scenarios.
Jingqiang Lin, Jiwu Jing, Peng Liu
openaire   +1 more source

Modeling Security Bridge Certificate Authority Architecture

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2009
Current Public Key Infrastructures suffer from a scaling problem, and some may have security problems, even given the topological simplification of bridge certification authorities. This paper analyzes the security problems in Bridge Certificate Authorities (BCA) model by using the concept of "impersonation risk," and proposes a new modified BCA model,
Yizhi REN, Mingchu LI, Kouichi SAKURAI
openaire   +1 more source

Formulation of Certificate Policy and Certification Practice Statement Framework for Subordinate Certification Authorities Indonesia

2016 International Conference on Information Science and Security (ICISS), 2016
Certificate Policy (CP) and Certification Practice Statement (CPS) are mandatory documents for Subordinate Certification Authorities (Sub-CAs) to explain their process business in Indonesia National Public Key Infrastructure (INPKI). Due to Sub-CAs' low proficiency in preparing CP and CPS, Ministry of Communication and Information Technology (MCIT ...
Arfive Gandhi   +2 more
openaire   +1 more source

Author’s certificate “Gearbox”

TEKHNOPARK.RF, 2021
N.O. Korolev   +2 more
openaire   +1 more source

Author’s certificate “Clutch”

TEKHNOPARK.RF, 2021
A.R. Shakirov   +2 more
openaire   +1 more source

Autonomous Decentralized Root Certification Authority System

2009 29th IEEE International Conference on Distributed Computing Systems Workshops, 2009
A Public Key Infrastructure (PKI) is a set of elements and procedures needed to create, store, manage, distribute and revoke digital certificates. Its main objective is to bind public keys with respective user identities assuring the uniqueness of these public keys.A PKI must guarantee the reliability of its services, assuring the timeliness of its ...
Luis Carlos Coronado-Garcia   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy