Public administrations show a strong interest in digital signature technology as a mean for secure and authenticated document exchange, hoping it will help reducing paper-based transactions with citizens. The main problem posed by this technology is with the necessary public-key infrastructure, and in particular with certificate status handling. This paper describes the definition and deployment of a web-based environment suitable for offering administrative services to citizens and for accepting authenticated documents from citizens. The best features of two different certificate status handling schemes, namely CRL and OCSP, have been exploited within this environment to obtain a good balance between security, timeliness and efficiency. 1
Certificate management is a crucial element in PKI implementations, which includes certificate gener...
Public-key infrastructures are increasingly being used as foundation for several security solutions,...
This poster outlines the findings of the Digital Certificate Operation in a Complex Environment (DCO...
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, lik...
A PKI (public key infrastructure) provides for a digital certificate that can identify an individual...
The paper presents a new on-line method for efficient authentication and verification of certificate...
Public key certificates (PKCs) are used nowadays in several security protocols and applications, so ...
In an organization with its own Private Network, it is not just enough to transfer the documents fro...
There is a lot of available services on the internet those need to be more secured and trusted. Publ...
In the future it is expected that some form of public key infrastructure will be used to support cri...
Abstract. The Public Key Infrastructure (PKI) technology is very im-portant to support secure global...
A public key infrastructure (PKI) secures lots of applications and processes. These are for example ...
Security mechanisms can only be effective if they are usable as well. Above all, this statement appl...
Public key infrastructures (PKIs) are of crucial importance for the life of online services relying ...
In an organization with its own Private Network , it is not just enough to transfer the documents fr...
Certificate management is a crucial element in PKI implementations, which includes certificate gener...
Public-key infrastructures are increasingly being used as foundation for several security solutions,...
This poster outlines the findings of the Digital Certificate Operation in a Complex Environment (DCO...
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, lik...
A PKI (public key infrastructure) provides for a digital certificate that can identify an individual...
The paper presents a new on-line method for efficient authentication and verification of certificate...
Public key certificates (PKCs) are used nowadays in several security protocols and applications, so ...
In an organization with its own Private Network, it is not just enough to transfer the documents fro...
There is a lot of available services on the internet those need to be more secured and trusted. Publ...
In the future it is expected that some form of public key infrastructure will be used to support cri...
Abstract. The Public Key Infrastructure (PKI) technology is very im-portant to support secure global...
A public key infrastructure (PKI) secures lots of applications and processes. These are for example ...
Security mechanisms can only be effective if they are usable as well. Above all, this statement appl...
Public key infrastructures (PKIs) are of crucial importance for the life of online services relying ...
In an organization with its own Private Network , it is not just enough to transfer the documents fr...
Certificate management is a crucial element in PKI implementations, which includes certificate gener...
Public-key infrastructures are increasingly being used as foundation for several security solutions,...
This poster outlines the findings of the Digital Certificate Operation in a Complex Environment (DCO...