A Public Key Infrastructure for User Identification
نویسندگان
چکیده
While there is wide agreement on the immense potential of Internet, its growth and performance are adversely affected by security issues. Despite its impressive size, scope and reach, the Internet has not yet become a common vehicle for many of these new possibilities. Progress in fields as electronic commerce and government-citizen relationships have been limited by the open design of the network itself. Today, Public-Key Infrastructures are the basis of the protocols and tools needed to guarantee the security demanded in those fields. Trust management and user identification are also important issues that remain unresolved. This paper introduces a key management and user identification system, named Cert’eM, that is based on the electronic mail service. Cert'eM provides important advantages over existing Public-Key Infrastructures and user identification proposals.
منابع مشابه
An User Authentication Infrastructure for Extranet Applications
An Extranet is used to connect businesses with their suppliers, customers or other businesses that share common goals in a way that automates their administrative interactions using Internet technology. The security of the communications over Internet is considered an essential feature. To guarantee secure operation the aid of some user authentication infrastructure is needed. This paper introd...
متن کاملA Self-organized Public-Key Certificate System in P2P network
P2P network is open, anonymous and dynamical in contrast with conventional network. It’s full of dishonesty, deceit, selfishness. It’s necessary to build a robust security infrastructure system. The one important module of security infrastructure is to identify the users in transactions. This paper will propose an identification solution based on PKI. In our algorithm, the peer generates their ...
متن کاملEnd User Security Training for Identification and Access Management
Identification and access management (I/AM) is among the top security issues facing institutions of higher education. Most institutions of higher education require end users to provide usernames and passwords to gain access to personally identifiable information (PII). This leaves universities vulnerable to unauthorized access and unauthorized disclosure of PII as, according to recent literatur...
متن کاملSecurity in the Ambient Computational Environment
Acknowledgements This thesis is the result of the help and support of many people. I would like to thank my committee-Dr. Evans, Dr Minden and Dr Agah for providing me with their valuable suggestions and insight. All their inputs came in at the right time and their help continued even after ACE was unfortunately closed down. Thanks are also due to our Senior Research Engineer Leon Searl without...
متن کاملPKAuth: A Social Login Protocol for Unregistered Applications
Social login is a double-redirection mechanism whereby a Web application delegates user authentication to a social site and obtains access to the user’s social context. Today social login is implemented using OAuth, which requires registration of the application with the site for authentication of the application to the site and identification of the application to the user by the site. As soci...
متن کامل