CA trust management for the Web PKI
نویسندگان
چکیده
Johannes Braun a,∗, Florian Volk b, Jiska Classen c, Johannes Buchmann a and Max Mühlhäuser b a Theoretical Computer Science, Cryptography and Computer Algebra, Technische Universität Darmstadt, Darmstadt, Germany E-mails: {jbraun, buchmann}@cdc.informatik.tu-darmstadt.de b Telecooperation Lab, Technische Universität Darmstadt and CASED, Darmstadt, Germany E-mails: [email protected], [email protected] c Secure Mobile Networking Lab, Technische Universität Darmstadt and CASED, Darmstadt, Germany E-mail: [email protected]
منابع مشابه
Reputation Systems for Trust Management in the Web PKI
This thesis’ goal is to reduce the attack surface of the existing Web Public Key Infrastructure (PKI) by applying user trust as in real world scenarios of human trust establishment. Reputation systems can be used to exchange Certification Authority (CA) trust information and lower the risk on relying on malicious CAs. The matter in question is connection trust, determining whether a SSL/TLS con...
متن کاملTrust Views for the Web PKI
The steadily growing number of certification authorities (CAs) assigned to the Web Public Key Infrastructure (Web PKI) and trusted by current browsers imposes severe security issues. Apart from being impossible for relying entities to assess whom they actually trust, the current binary trust model implemented with the Web PKI makes each CA a single point of failure. In this paper, we present th...
متن کاملTrust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker
A Public Key Infrastructure (PKI) is considered one of the most important techniques used to propagate trust in authentication over the Internet. This technology is based on a trust model defined by the original X.509 (1988) standard and is composed of three entities: the certification authority (CA), the certificate holder (or subject), and the Relying Party (RP). The CA plays the role of a tr...
متن کاملRisk and Trust Management Techniques RISK AND TRUST MANAGEMENT TECHNIQUES FOR AN “OPEN BUT BOUNDED” PUBLIC KEY INFRASTRUCTURE
Establishing trustworthiness requires an analysis of the business, technical and legal requirements for each party to a Public Key Infrastructure (PKI) based transaction. Much of the current discussion about PKI requirements revolves around the license, accreditation, or other sets of ratings as applied to certification authorities (CA). It is becoming apparent that an exclusive focus on CA qua...
متن کاملMaintaining security and trust in large scale public key infrastructures
In Public Key Infrastructures (PKIs), trusted Certification Authorities (CAs) issue public key certificates which bind public keys to the identities of their owners. This enables the authentication of public keys which is a basic prerequisite for the use of digital signatures and public key encryption. These in turn are enablers for ebusiness, e-government and many other applications, because t...
متن کاملUtilizing Social Networking Platforms to Support Public Key Infrastructures
Although public key infrastructures (PKI) exist for quite a while already, neither hierarchical PKI based on Certification Authorities (CA) nor decentralized webs-of-trust have come to great popularity, particularly not in the private sector. In this paper we want to analyze some reasons for this development and propose possible solutions. The utilization of social networking platforms which ha...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Journal of Computer Security
دوره 22 شماره
صفحات -
تاریخ انتشار 2014