One of the hardest tasks of a certification infrastructure is to manage revocation. This process consists in collecting and making the revocation status of certificates available to users. Research on this topic has focused on the trade-offs that different revocation mechanisms offer. Much less effort has been conducted to understand and model real-world revocation processes. For this reason, in this paper, we present a novel analysis of real-world collected revocation data and we propose a revocation prediction model. The model uses an autoregressive integrated moving average model. Our prediction model enables certification authorities to forecast the number of revoked certificates in short term.Peer Reviewe
Public key infrastructures (PKIs) are complex distributed systems that are responsible for giving us...
Critical to the security of any public key infrastructure (PKI) is the ability to revoke previously ...
Verification of the certificate revocation status is a crucial process for Public Key Infrastructure...
One of the hardest tasks of a public key infrastructure (PKI) is to manage revocation. New communic...
Public key infrastructure provides a promising founda-tion for verifying the authenticity of communi...
In a traditional PKI, the trust associated with a public key is expressed in binary either by 0 or 1...
One of the hardest tasks of a Public Key Infrastructure (PKI) is to manage revocation. Different rev...
Public key infrastructure has been proposed as a promising foundation for verifying the authenticity...
Correct certificate revocation practices are essential to each public-key infrastructure. While ther...
Public key infrastructure has been proposed as a promising foundation for verifying the authenticity...
In this thesis, I define all currently operational, proposed, and theoretically possible methods of ...
The distribution and revocation of public-key certificates are essential aspects of secure digital c...
The X.509 landscape is one of the cornerstones of the internet today. It is used to establish trust ...
A fundamental problem inhibiting the wide acceptance of a Public Key Infrastructure (PKI) in the Int...
Presented on January 12, 2018 at 12:20 p.m. in the Klaus Advanced Computing Building, Room 2447.Dave...
Public key infrastructures (PKIs) are complex distributed systems that are responsible for giving us...
Critical to the security of any public key infrastructure (PKI) is the ability to revoke previously ...
Verification of the certificate revocation status is a crucial process for Public Key Infrastructure...
One of the hardest tasks of a public key infrastructure (PKI) is to manage revocation. New communic...
Public key infrastructure provides a promising founda-tion for verifying the authenticity of communi...
In a traditional PKI, the trust associated with a public key is expressed in binary either by 0 or 1...
One of the hardest tasks of a Public Key Infrastructure (PKI) is to manage revocation. Different rev...
Public key infrastructure has been proposed as a promising foundation for verifying the authenticity...
Correct certificate revocation practices are essential to each public-key infrastructure. While ther...
Public key infrastructure has been proposed as a promising foundation for verifying the authenticity...
In this thesis, I define all currently operational, proposed, and theoretically possible methods of ...
The distribution and revocation of public-key certificates are essential aspects of secure digital c...
The X.509 landscape is one of the cornerstones of the internet today. It is used to establish trust ...
A fundamental problem inhibiting the wide acceptance of a Public Key Infrastructure (PKI) in the Int...
Presented on January 12, 2018 at 12:20 p.m. in the Klaus Advanced Computing Building, Room 2447.Dave...
Public key infrastructures (PKIs) are complex distributed systems that are responsible for giving us...
Critical to the security of any public key infrastructure (PKI) is the ability to revoke previously ...
Verification of the certificate revocation status is a crucial process for Public Key Infrastructure...