CAs Infrastructure for Secure Open Communications
نویسندگان
چکیده
This work proposes a Certification Authorities organization in order to achieve secure open communications. The report considers current international ongoing works as well as existing practices. Actually, our work tries to solve the present shortcomings when trying to organize a hierarchical CAs structure based on a naming hierarchy. The proposal focuses in the idea of having certification and naming separated, thus both hierarchies are not related anymore at the starting point, however it can be further related at application level. An important point is the provided architectural semantics for developing initial and further growing up certification hierarchies. In this way, current systems like PGP or RIPEM can be initially set up and further grown to more global structures. Authors: F.Jordan, M.Medina, J.C.Cruellas and I.Gallego Version: Draft Date: May 24, 1994 Responsible: F.Jordan E-mail: [email protected]
منابع مشابه
Enhancing the Security of Visa 3-D Secure against Spoofing Attacks
Visa 3-D Secure is an e-payment system based on the integration of SSL/TLS with the three-domain architecture. It employs cryptographic techniques to secure communication links among participants in e-commerce transactions and also provides credit card verification via Visa Secure Server. Although several security vulnerabilities can be addressed, spoofing attacks are still effective and can be...
متن کاملCAS++: An Open Source Single Sign-On Solution for Secure e-Services
Business and recreational activities on the global communication infrastructure are increasingly based on the use of remote resources and services, and on the interaction between different, remotely located parties. On corporate networks as well as on the open Web, the huge number of resources and services often requires to multiple log-ons leading to credential proliferation and, potentially, ...
متن کاملSelf-Managed Heterogeneous Certification in Mobile Ad Hoc Networks
As mobile ad hoc networks grow into a pervasive computing infrastructure, it is commonplace for wireless nodes owned by different entities to collaborate and communicate with one another. However, in cases where identity authentication is required to secure the communications, a new problem will be raised. On one hand, certificates of different nodes are possibly issued by different Certificate...
متن کاملPKI in B2C E-Commerce
General purpose (open) and application-specific (closed) PKIs are two main categories of PKI that support a variety of cryptographic operations for providing secure environment. SSL/TLS and SET are two distinct security protocols utilising these PKI categories for securing e-commerce transactions. While the former protocol categorised as a general purpose PKI has been playing an important role ...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کامل