Results 161 to 170 of about 64,904 (211)
Some of the next articles are maybe not open access.
2017
Abstract Certificate authorities serve as trusted parties to help secure web communications. They are a vital component for ensuring the security of cloud infrastructures and big data repositories. Unfortunately, recent attacks using mis-issued certificates show that this model is severely broken. Much research has been done to enhance certificate
Jiangshan Yu, Mark Ryan
openaire +1 more source
Abstract Certificate authorities serve as trusted parties to help secure web communications. They are a vital component for ensuring the security of cloud infrastructures and big data repositories. Unfortunately, recent attacks using mis-issued certificates show that this model is severely broken. Much research has been done to enhance certificate
Jiangshan Yu, Mark Ryan
openaire +1 more source
The Siemens PKI — Implementation of PKI Self Services
2004The Siemens PKI, a global enterprise PKI with more than 200.000 users and 100.000 smart cards issued world-wide, was started in 1998/99. Deploying a PKI well-organized processes are a key success factor. Entering the second 3 years certificates life cycle in Siemens in 2002 managed re-keying via de-central Local Registration Authorities (LRAs) turned ...
openaire +1 more source
2013
A PKI can be described as a set of technologies, procedures, and policies for propagating trust from where it initially exists to where it is needed for authentication in online environments. How the trust propagation takes place under a specific PKI depends on the PKI’s syntactic trust structure, which is commonly known as a trust model.
openaire +1 more source
A PKI can be described as a set of technologies, procedures, and policies for propagating trust from where it initially exists to where it is needed for authentication in online environments. How the trust propagation takes place under a specific PKI depends on the PKI’s syntactic trust structure, which is commonly known as a trust model.
openaire +1 more source
2014
Implementing and managing a Public Key Infrastructure (PKI) is a complex undertaking which can prove extremely challenging. While there exist software tools to aid the task, such an undertaking can prove troublesome and time consuming if not approached sensibly.
openaire +1 more source
Implementing and managing a Public Key Infrastructure (PKI) is a complex undertaking which can prove extremely challenging. While there exist software tools to aid the task, such an undertaking can prove troublesome and time consuming if not approached sensibly.
openaire +1 more source
2011
Several National Research and Education Networks associated in TERENA have joined their efforts to build a shared PKI able to serve potentially millions of users from their constituency. The TCS eScience Personal CA takes advantage of national identity federations to facilitate user identity vetting and enrollment procedures.
openaire +1 more source
Several National Research and Education Networks associated in TERENA have joined their efforts to build a shared PKI able to serve potentially millions of users from their constituency. The TCS eScience Personal CA takes advantage of national identity federations to facilitate user identity vetting and enrollment procedures.
openaire +1 more source
Privacy‐aware PKI model with strong forward security
International Journal of Intelligent Systems, 2022Fengyin Li, Hua Wang, Huiyu Zhou
exaly
Cross-domain identity authentication scheme based on blockchain and PKI system
High-Confidence Computing, 2023Feng Zhao
exaly

