The PKI Secure Kernel Protection Profile
نویسنده
چکیده
منابع مشابه
OpenHSM: An Open Key Life Cycle Protocol for Public Key Infrastructure's Hardware Security Modules
The private keys used in a PKI are its most important asset. Protect these keys from unauthorised use or disclosure is essential to secure a PKI. Relying parties need assurances that the private key used to sign their certificates is controlled and managed following pre-defined statement policy. Hardware Security Modules (HSM) offer physical and logical protection and should be considered for a...
متن کاملStepping Beyond the PKI Pilot
Despite much of the negative publicity that it has suffered recently, Public Key Infrastructure (PKI) continues to play a critical role in underpinning security on the Internet and other potentially hostile network environments. In such environments, it is common to deploy secure protocols to deliver one or more standard network security services (authentication, confidentiality protection, int...
متن کاملSecure E-learning and Cryptography
This chapter investigates the problem of secure e-learning and the use cryptography algorithms as tools to ensure integrity, confidentiality, non-reputations, authentication, and access control to provide secure knowledge delivery, secure student feedback, and secure assessments. Providing privacy in e-learning focuses on the protection of personal information of a learner in an e-learning syst...
متن کاملSILVER: Fine-Grained and Transparent Protection Domain Primitives in Commodity OS Kernel
Untrusted kernel extensions remain one of the major threats to the security of commodity OS kernels. Current containment approaches still have limitations in terms of security, granularity and flexibility, primarily due to the absence of secure resource management and communication methods. This paper presents SILVER, a framework that offers transparent protection domain primitives to achieve f...
متن کامل