Hierarchical Organization of Certification Authorities for Secure Environments
نویسندگان
چکیده
منابع مشابه
CAs Infrastructure for Secure Open Communications
This work proposes a Certification Authorities organization in order to achieve secure open communications. The report considers current international ongoing works as well as existing practices. Actually, our work tries to solve the present shortcomings when trying to organize a hierarchical CAs structure based on a naming hierarchy. The proposal focuses in the idea of having certification and...
متن کاملA Secure Architecture for Mobile Ad Hoc Networks
In this paper, we propose a new architecture based on an efficient trust model and clustering algorithm in order to distribute a certification authority (CA) for ensuring the distribution of certificates in each cluster. We use the combination of fully self-organized security for trust model like PGP adapted to ad-hoc technology and the clustering algorithm which is based on the use of trust an...
متن کاملSFS-HTTP: Securing the Web with Self-Certifying URLs
The current solution to secure Web communication is SSL which relies on certificate authorities for key management, limiting the ability for individuals to independently set up secure Web sites and forcing them to trust a small number of third parties. We propose a new model for Web security— SFS-HTTP—based on SFS. While SFS uses self-certifying pathnames to separate key management from file sy...
متن کاملPKI and digital certification infrastructure
Secure VPN technology is only possible with the use of appropriate security systems such as encryption, digital signatures, digital certificates, public/private key pairs, non-repudiation, and time-stamping. A PKI comprises a system of certificates, certificate authorities, subjects, relying partners, registration authorities, and key repositories that provide for safe and reliable communicatio...
متن کاملAuthorization models for secure information sharing: a survey and research agenda
This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...
متن کامل