A Public Key Infrastructure for User Identification

نویسندگان

  • Javier Lopez
  • Antonio Maña
  • Juan J. Ortega
چکیده

While there is wide agreement on the immense potential of Internet, its growth and performance are adversely affected by security issues. Despite its impressive size, scope and reach, the Internet has not yet become a common vehicle for many of these new possibilities. Progress in fields as electronic commerce and government-citizen relationships have been limited by the open design of the network itself. Today, Public-Key Infrastructures are the basis of the protocols and tools needed to guarantee the security demanded in those fields. Trust management and user identification are also important issues that remain unresolved. This paper introduces a key management and user identification system, named Cert’eM, that is based on the electronic mail service. Cert'eM provides important advantages over existing Public-Key Infrastructures and user identification proposals.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An User Authentication Infrastructure for Extranet Applications

An Extranet is used to connect businesses with their suppliers, customers or other businesses that share common goals in a way that automates their administrative interactions using Internet technology. The security of the communications over Internet is considered an essential feature. To guarantee secure operation the aid of some user authentication infrastructure is needed. This paper introd...

متن کامل

A Self-organized Public-Key Certificate System in P2P network

P2P network is open, anonymous and dynamical in contrast with conventional network. It’s full of dishonesty, deceit, selfishness. It’s necessary to build a robust security infrastructure system. The one important module of security infrastructure is to identify the users in transactions. This paper will propose an identification solution based on PKI. In our algorithm, the peer generates their ...

متن کامل

End User Security Training for Identification and Access Management

Identification and access management (I/AM) is among the top security issues facing institutions of higher education. Most institutions of higher education require end users to provide usernames and passwords to gain access to personally identifiable information (PII). This leaves universities vulnerable to unauthorized access and unauthorized disclosure of PII as, according to recent literatur...

متن کامل

Security in the Ambient Computational Environment

Acknowledgements This thesis is the result of the help and support of many people. I would like to thank my committee-Dr. Evans, Dr Minden and Dr Agah for providing me with their valuable suggestions and insight. All their inputs came in at the right time and their help continued even after ACE was unfortunately closed down. Thanks are also due to our Senior Research Engineer Leon Searl without...

متن کامل

PKAuth: A Social Login Protocol for Unregistered Applications

Social login is a double-redirection mechanism whereby a Web application delegates user authentication to a social site and obtains access to the user’s social context. Today social login is implemented using OAuth, which requires registration of the application with the site for authentication of the application to the site and identification of the application to the user by the site. As soci...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011