We identify end-user digital certificate management as a vulnerability in public key infrastructure (PKI) which threatens the trust assurance abilities of any PKI system relying on digital certificates for authentication purposes. Since trust in PKI is inherited in a top-down approach from a known or trusted certification authority (CA), PKI’s trust hierarchy abstracts trust from the end user. We argue that the CA trust hierarchy implementation, while important for enabling trust between unknown parties, does not provide an acceptable level of authentication and therefore causes PKI’s claim of non-repudiation to fail. This paper presents a case, and potential solutions, for improved authentication in PKI through secure certificate managemen...
Abstract. Trust-management systems address the authorization problem in dis-tributed systems. They o...
Public-key infrastructures are increasingly being used as foundation for several security solutions,...
Abstract. The steadily growing number of certification authorities (CAs) assigned to the Web Public ...
open access journalA Public Key Infrastructure (PKI) is considered one of the most important techniq...
International audienceA Public Key Infrastructure (PKI) is considered one of the most important tech...
Public-Key Infrastructure (PKI) is the cornerstone technology that facilitates secure information ex...
All human co-operation is based on trust, meaning that we choose co-operation partners and make com...
There is a lot of available services on the internet those need to be more secured and trusted. Publ...
Security mechanisms can only be effective if they are usable as well. Above all, this statement appl...
<p>Recent trends in public-key infrastructure research explore the tradeoff between decreased trust ...
Abstract. All human co-operation is based on trust, meaning that we choose co-operation partners and...
The modern digital internet economy and billions of dollars of trade are made possible by the intern...
© 2015 ACM. Certificate Authority (CA) is a single point of failure in the design of Public Key Infr...
Creating a secure connection on the Internet is made possible through the usage of certificates, bin...
Recent attacks and publications have shown the vulnerability of hierarchical Public Key Infrastructu...
Abstract. Trust-management systems address the authorization problem in dis-tributed systems. They o...
Public-key infrastructures are increasingly being used as foundation for several security solutions,...
Abstract. The steadily growing number of certification authorities (CAs) assigned to the Web Public ...
open access journalA Public Key Infrastructure (PKI) is considered one of the most important techniq...
International audienceA Public Key Infrastructure (PKI) is considered one of the most important tech...
Public-Key Infrastructure (PKI) is the cornerstone technology that facilitates secure information ex...
All human co-operation is based on trust, meaning that we choose co-operation partners and make com...
There is a lot of available services on the internet those need to be more secured and trusted. Publ...
Security mechanisms can only be effective if they are usable as well. Above all, this statement appl...
<p>Recent trends in public-key infrastructure research explore the tradeoff between decreased trust ...
Abstract. All human co-operation is based on trust, meaning that we choose co-operation partners and...
The modern digital internet economy and billions of dollars of trade are made possible by the intern...
© 2015 ACM. Certificate Authority (CA) is a single point of failure in the design of Public Key Infr...
Creating a secure connection on the Internet is made possible through the usage of certificates, bin...
Recent attacks and publications have shown the vulnerability of hierarchical Public Key Infrastructu...
Abstract. Trust-management systems address the authorization problem in dis-tributed systems. They o...
Public-key infrastructures are increasingly being used as foundation for several security solutions,...
Abstract. The steadily growing number of certification authorities (CAs) assigned to the Web Public ...