CAs Infrastructure for Secure Open Communications

نویسندگان

  • Francisco Jordan
  • Manuel Medina
  • Juan Carlos Cruellas
  • Isabel Gallego
چکیده

This work proposes a Certification Authorities organization in order to achieve secure open communications. The report considers current international ongoing works as well as existing practices. Actually, our work tries to solve the present shortcomings when trying to organize a hierarchical CAs structure based on a naming hierarchy. The proposal focuses in the idea of having certification and naming separated, thus both hierarchies are not related anymore at the starting point, however it can be further related at application level. An important point is the provided architectural semantics for developing initial and further growing up certification hierarchies. In this way, current systems like PGP or RIPEM can be initially set up and further grown to more global structures. Authors: F.Jordan, M.Medina, J.C.Cruellas and I.Gallego Version: Draft Date: May 24, 1994 Responsible: F.Jordan E-mail: [email protected]

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enhancing the Security of Visa 3-D Secure against Spoofing Attacks

Visa 3-D Secure is an e-payment system based on the integration of SSL/TLS with the three-domain architecture. It employs cryptographic techniques to secure communication links among participants in e-commerce transactions and also provides credit card verification via Visa Secure Server. Although several security vulnerabilities can be addressed, spoofing attacks are still effective and can be...

متن کامل

CAS++: An Open Source Single Sign-On Solution for Secure e-Services

Business and recreational activities on the global communication infrastructure are increasingly based on the use of remote resources and services, and on the interaction between different, remotely located parties. On corporate networks as well as on the open Web, the huge number of resources and services often requires to multiple log-ons leading to credential proliferation and, potentially, ...

متن کامل

Self-Managed Heterogeneous Certification in Mobile Ad Hoc Networks

As mobile ad hoc networks grow into a pervasive computing infrastructure, it is commonplace for wireless nodes owned by different entities to collaborate and communicate with one another. However, in cases where identity authentication is required to secure the communications, a new problem will be raised. On one hand, certificates of different nodes are possibly issued by different Certificate...

متن کامل

PKI in B2C E-Commerce

General purpose (open) and application-specific (closed) PKIs are two main categories of PKI that support a variety of cryptographic operations for providing secure environment. SSL/TLS and SET are two distinct security protocols utilising these PKI categories for securing e-commerce transactions. While the former protocol categorised as a general purpose PKI has been playing an important role ...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1994