The paper proposes a method based on different security-related factors to dynamically calculate the validity period of digital certificates. Currently validity periods are most often defined statically without scientific justification. This approach is not sufficient to objectively consider the actual need for security. Therefore the approach proposed in this paper considers relevant security criteria in order to calculate a meaningful validity period for digital certificates. This kind of security assessment can be executed periodically in order to dynamically respond to changing conditions. Especially in the context of complex systems and infrastructures that have an increased need for security, privacy and availability this issue is hig...
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express ...
A PKI (public key infrastructure) provides for a digital certificate that can identify an individual...
Information fusion includes signals, features, and decision-level analysis over various types of dat...
The paper proposes a method based on different security-related factors to dynamically calculate the...
Context. An SSL encrypted client-server communication is necessary to maintain the security and priv...
This work deals with the possibilities of using digital certificates and certification authorities o...
Abstract: The increasing number of clients and users of e-banking, e-government and e-application th...
Certificates are the foundation of secure communication over the internet as of today. While certifi...
All certificates, including those for secondary school graduation, high school diplomas, and college...
Digital certificates signed by trusted certification authorities (CAs) are used for multiple purpos...
It is widely recognized that metrics are important to information security. Metrics can be an effect...
The deep integration between the cyber and physical domains in complex systems make very challenging...
Traditional information security risk assessment (RA) methodologies and standards, adopted by inform...
Cloud computing introduces several characteristics that challenge the effectiveness of current certi...
Due to digitalization and technological advancement, systems and their requirements are changing, an...
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express ...
A PKI (public key infrastructure) provides for a digital certificate that can identify an individual...
Information fusion includes signals, features, and decision-level analysis over various types of dat...
The paper proposes a method based on different security-related factors to dynamically calculate the...
Context. An SSL encrypted client-server communication is necessary to maintain the security and priv...
This work deals with the possibilities of using digital certificates and certification authorities o...
Abstract: The increasing number of clients and users of e-banking, e-government and e-application th...
Certificates are the foundation of secure communication over the internet as of today. While certifi...
All certificates, including those for secondary school graduation, high school diplomas, and college...
Digital certificates signed by trusted certification authorities (CAs) are used for multiple purpos...
It is widely recognized that metrics are important to information security. Metrics can be an effect...
The deep integration between the cyber and physical domains in complex systems make very challenging...
Traditional information security risk assessment (RA) methodologies and standards, adopted by inform...
Cloud computing introduces several characteristics that challenge the effectiveness of current certi...
Due to digitalization and technological advancement, systems and their requirements are changing, an...
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express ...
A PKI (public key infrastructure) provides for a digital certificate that can identify an individual...
Information fusion includes signals, features, and decision-level analysis over various types of dat...