Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture
نویسندگان
چکیده
1University of the Aegean, Department of Information and Communication Systems, Karlovassi GR-832 00, Greece, {sgritz, ska,dlek}@aegean.gr . 2Technological Education Institute of Athens, Department of Informatics,Ag. Spiridonos St.,Aegaleo GR-122 10, Greece. 3Data Protection Commission, 8 Omirou St.,Athens GR-105 64, Greece. 4Athens University of Economics & Business, Department of Informatics, 76 Patission St.,Athens GR-104 34, Greece,{kdm, epp}@aueb.gr .
منابع مشابه
Keystone: A Group Key Management Service
A major problem area in securing group communications is group key management. In this paper, we present the design and architecture of a scalable group key management system called Keystone. Key-stone uses a novel key graph technique for scalable group key management. In Keystone, the authentica-tion of client identity can be oooaded to one or more registrars to improve performance. For eecien...
متن کاملData Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud
The term data security refers to the degree of resistance of protection given to information from unintended or unauthorized access. The core principles of information security remain the same Confidentiality, Integrity and Availability also referred as CIA triad. With cloud adoption the confidential enterprise data is moved from organization premises to untrusted public network and due to this...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملSecuring Database using Public Key Infrastructure A Proposed DB PKI Architecture
Database security concerns the use of a broad range of information security controls to protect databases potentially including the data, the database applications or stored functions, the database systems, the database servers and the associated network links against compromises of their confidentiality, integrity and availability. It involves various types or categories of controls, such as t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computers & Security
دوره 19 شماره
صفحات -
تاریخ انتشار 2000