Results 301 to 310 of about 322,522 (351)
Some of the next articles are maybe not open access.
A merging method of certification authorities without using cross-certifications
18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004., 2004The public key infrastructure (PKI) technology is very important to support secure global electronic commerce and digital communications on networks. In electronic commerce, different PKIs need to be interoperated. Especially, they need to be merged for merger and acquisition of companies.
S. Koga, K. Sakurai
openaire +1 more source
Certification Authority Liability Analysis
SSRN Electronic Journal, 1998This paper surveys the liability issues raised by an entity’s entry into the certification authority business. Because the duties and potential liabilities imposed upon a CA by applicable law are unclear, this paper addresses the major sources of U.S.
openaire +1 more source
Certification Authorities Under Attack: A Plea for Certificate Legitimation
IEEE Internet Computing, 2014Several recent attacks against certification authorities (CAs) and fraudulently issued certificates have put the security and usefulness of the Internet public-key infrastructure (PKI) at stake. In this article, the author argues that such attacks are likely to occur repeatedly and that respective countermeasures must be designed, implemented, and put ...
openaire +1 more source
Approach to analysis of certification authorities
2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS), 2017This article considers the selection of companies that provide services of quality management systems certification. The choice of companies for product certification is a very important decision that will affect the reputation of the organization. To select such a company, it is necessary to take into account a large number of indicators.
Y. Klochkov +4 more
openaire +1 more source
Evaluating Intrusion‐Tolerant Certification Authority Systems
Quality and Reliability Engineering International, 2011Various intrusion‐tolerant certification authority (CA) systems have been proposed to provide attack resilient certificate signing (or update) services. However, it is difficult to compare them against each other directly, due to the diversity in system organizations, threshold signature schemes, protocols and usage scenarios.
Jingqiang Lin, Jiwu Jing, Peng Liu
openaire +1 more source
Modeling Security Bridge Certificate Authority Architecture
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2009Current Public Key Infrastructures suffer from a scaling problem, and some may have security problems, even given the topological simplification of bridge certification authorities. This paper analyzes the security problems in Bridge Certificate Authorities (BCA) model by using the concept of "impersonation risk," and proposes a new modified BCA model,
Yizhi REN, Mingchu LI, Kouichi SAKURAI
openaire +1 more source
2016 International Conference on Information Science and Security (ICISS), 2016
Certificate Policy (CP) and Certification Practice Statement (CPS) are mandatory documents for Subordinate Certification Authorities (Sub-CAs) to explain their process business in Indonesia National Public Key Infrastructure (INPKI). Due to Sub-CAs' low proficiency in preparing CP and CPS, Ministry of Communication and Information Technology (MCIT ...
Arfive Gandhi +2 more
openaire +1 more source
Certificate Policy (CP) and Certification Practice Statement (CPS) are mandatory documents for Subordinate Certification Authorities (Sub-CAs) to explain their process business in Indonesia National Public Key Infrastructure (INPKI). Due to Sub-CAs' low proficiency in preparing CP and CPS, Ministry of Communication and Information Technology (MCIT ...
Arfive Gandhi +2 more
openaire +1 more source
Autonomous Decentralized Root Certification Authority System
2009 29th IEEE International Conference on Distributed Computing Systems Workshops, 2009A Public Key Infrastructure (PKI) is a set of elements and procedures needed to create, store, manage, distribute and revoke digital certificates. Its main objective is to bind public keys with respective user identities assuring the uniqueness of these public keys.A PKI must guarantee the reliability of its services, assuring the timeliness of its ...
Luis Carlos Coronado-Garcia +2 more
openaire +1 more source

