CA trust management for the Web PKI

نویسندگان

  • Johannes Braun
  • Florian Volk
  • Jiska Classen
  • Johannes A. Buchmann
  • Max Mühlhäuser
چکیده

Johannes Braun a,∗, Florian Volk b, Jiska Classen c, Johannes Buchmann a and Max Mühlhäuser b a Theoretical Computer Science, Cryptography and Computer Algebra, Technische Universität Darmstadt, Darmstadt, Germany E-mails: {jbraun, buchmann}@cdc.informatik.tu-darmstadt.de b Telecooperation Lab, Technische Universität Darmstadt and CASED, Darmstadt, Germany E-mails: [email protected], [email protected] c Secure Mobile Networking Lab, Technische Universität Darmstadt and CASED, Darmstadt, Germany E-mail: [email protected]

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reputation Systems for Trust Management in the Web PKI

This thesis’ goal is to reduce the attack surface of the existing Web Public Key Infrastructure (PKI) by applying user trust as in real world scenarios of human trust establishment. Reputation systems can be used to exchange Certification Authority (CA) trust information and lower the risk on relying on malicious CAs. The matter in question is connection trust, determining whether a SSL/TLS con...

متن کامل

Trust Views for the Web PKI

The steadily growing number of certification authorities (CAs) assigned to the Web Public Key Infrastructure (Web PKI) and trusted by current browsers imposes severe security issues. Apart from being impossible for relying entities to assess whom they actually trust, the current binary trust model implemented with the Web PKI makes each CA a single point of failure. In this paper, we present th...

متن کامل

Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker

A Public Key Infrastructure (PKI) is considered one of the most important techniques used to propagate trust in authentication over the Internet. This technology is based on a trust model defined by the original X.509 (1988) standard and is composed of three entities: the certification authority (CA), the certificate holder (or subject), and the Relying Party (RP). The CA plays the role of a tr...

متن کامل

Risk and Trust Management Techniques RISK AND TRUST MANAGEMENT TECHNIQUES FOR AN “OPEN BUT BOUNDED” PUBLIC KEY INFRASTRUCTURE

Establishing trustworthiness requires an analysis of the business, technical and legal requirements for each party to a Public Key Infrastructure (PKI) based transaction. Much of the current discussion about PKI requirements revolves around the license, accreditation, or other sets of ratings as applied to certification authorities (CA). It is becoming apparent that an exclusive focus on CA qua...

متن کامل

Maintaining security and trust in large scale public key infrastructures

In Public Key Infrastructures (PKIs), trusted Certification Authorities (CAs) issue public key certificates which bind public keys to the identities of their owners. This enables the authentication of public keys which is a basic prerequisite for the use of digital signatures and public key encryption. These in turn are enablers for ebusiness, e-government and many other applications, because t...

متن کامل

Utilizing Social Networking Platforms to Support Public Key Infrastructures

Although public key infrastructures (PKI) exist for quite a while already, neither hierarchical PKI based on Certification Authorities (CA) nor decentralized webs-of-trust have come to great popularity, particularly not in the private sector. In this paper we want to analyze some reasons for this development and propose possible solutions. The utilization of social networking platforms which ha...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Journal of Computer Security

دوره 22  شماره 

صفحات  -

تاریخ انتشار 2014