نتایج جستجو برای: pki

تعداد نتایج: 1556  

2001
Albert Levi Çetin Kaya Koç

Problems with certificate revocation status control limit the deployment of Public Key Infrastructure (PKI). Classical certificate paths require revocation control of all certificates on the path. In this paper, we show how the recently proposed NPKI (Nested certificate based PKI) system reduces the number of revocation status controls to at most two. Our analysis also shows that NPKI is not as...

Journal: :Vojnotehnicki glasnik 2017

Journal: :Cryptography 2021

The conventional public key infrastructure (PKI) model, which powers most of the Internet, suffers from an excess trust into certificate authorities (CAs), compounded by a lack transparency makes it vulnerable to hard-to-detect targeted stealth impersonation attacks. Existing approaches make issuance more transparent, including ones based on blockchains, are still somewhat centralized. We prese...

2002
Phillip Hallam-Baker

The Trust Assertion XML Infrastructure (TAXI) is described. TAXI is a PKI research project that had the objective of developing technology that would assist the deployment of PKI. Parts of the TAXI architecture have since been realized in open standards, notably the XKMS [XKMS] and SAML [SAML] specifications, other parts of the TAXI architecture such as XTAML [XTAML] and XKASS [XKASS] have been...

2001
Boaz Gelbord Gert Roelofsen

In this short paper we introduce a technique for a more private form of biometric identification to be used in PKI applications. We discuss how this technique can be applied within Internet banking. In particular we see the opportunity to apply these techniques in some of the developing PKI markets in Asia, where the legacy PKI systems will not form a barrier to entry. Biometric techniques have...

Journal: :Softw., Pract. Exper. 2005
Marty Humphrey Jim Basney Jim Jokl

As Grid deployments increase, the challenge remains to create a scalable, multi-organizational authentication infrastructure. Public key infrastructures (PKIs) are widely used for authentication in Grids, due in large part to the success of the Globus toolkit, despite the challenges and difficulties both for PKI administrators and users. The Bridge Certificate Authority (CA) is a compromise bet...

2005
ZHANG Shaomin WANG Baoyi

Organizations use PKI (Public Key Infrastructures) to support internal business processes, but some businesses have industrial partnerships with others, and these alliances can exploit B2B (Business to Business) e-commerce capabilities by connecting corporate PKI. The paper deals with two methods to realize access control in extended organization PKI business processes: BCAs (Bridge Certificati...

2004
Jim Jokl Jim Basney Marty Humphrey

Public-Key Infrastructures (PKIs) are widely used for authentication in Grids, due in large part to the success of the Globus toolkit, despite the challenges and difficulties both for PKI administrators and users. The Bridge Certificate Authority (CA) is a compromise between a strictly hierarchical PKI and a mesh PKI and achieves many of the benefits of the hierarchical PKI and mesh PKI but has...

2004
A. Jancic Matthew J. Warren

Electronic communications have become the most important kind of communications in business. However, trust, privacy and security have become the great challenges for business and governments around the globe. The Public Key Infrastructure (PKI) model tries to solve these issues and make the Internet more secure. This paper explains the main purposes of PKI and addresses some of the major issue...

2013
Ashmeet Kaur

Database security concerns the use of a broad range of information security controls to protect databases potentially including the data, the database applications or stored functions, the database systems, the database servers and the associated network links against compromises of their confidentiality, integrity and availability. It involves various types or categories of controls, such as t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید