Electronic Notary System and its Certification Mechanism
نویسنده
چکیده
We have developed a prototype electronic notary system (CYNOS : CYber NOtary System). CYNOS proves facts by providing the evidence (notary token) of events and/or actions that could be used to solve disputes between entities. It is a signature-based system and uses various security techniques to enable the timely certification of entities and fair and highly reliable delivery. It also cooperates with our CA (CANP : Certification Authority for secure Network Platform) through the network. This paper describes CYNOS with regard to its service, functions, and mechanism. The ability of CYNOS to support the nonrepudiation service and some issues on system management are discussed. The additional requirements that are needed if the certification mechanism is to realize practical notarization functions are addressed.
منابع مشابه
Extracting Certificates from Live Traffic: A Near Real-Time SSL Notary Service
Much of the Internet's end-to-end security relies on the SSL protocol along with its underlying X.509 certificate infrastructure. However, the system remains quite brittle due to its liberal delegation of signing authority: a single compromised certification authority undermines trust globally. We present a novel notary service that helps clients to identify malicious certificates by providing ...
متن کاملDynamic Support Service Selection for Business Transactions in Electronic Service Markets
Business transactions in an electronic service market are expected to appear spontaneously, anonymously, and with varying requirements of infrastructural support. This support generally covers security requirements such as authentication, privacy, and public key certification as well as payment protocols or the demand for notary services. The latter two aspects are considered in particular in t...
متن کاملDDNFS: a Distributed Digital Notary File System
Safeguarding online communications using public key cryptography is a well-established practice today, but with the increasing reliance on “faceless”, solely online entities one of the core aspects of public key cryptography is becoming a substantial problem in practice: Who can we trust to introduce us to and vouch for some online party whose public key we see for the first time? Most existing...
متن کاملA Review of the Process of Meaningful Use Program and its Challenges in the Electronic Health Record Roadmap
Introduction: Meaningful use program indicates that health care organizations make meaningful use of an accredited electronic health record system. The objective of this study was to investigate the process of “meaningful use” program and the related challenges for the development of electronic health record. Method: This review study was conducted in 2020. The PubMed, Scopus, Science Direct, a...
متن کاملA Review of the Process of Meaningful Use Program and its Challenges in the Electronic Health Record Roadmap
Introduction: Meaningful use program indicates that health care organizations make meaningful use of an accredited electronic health record system. The objective of this study was to investigate the process of “meaningful use” program and the related challenges for the development of electronic health record. Method: This review study was conducted in 2020. The PubMed, Scopus, Science Direct, a...
متن کامل