A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Development of Certificate Authority services for web applications
2012
2012 International Conference on Future Communication Networks
A PKI system works by having a Certificate Authority (CA) for issuing public-key certificates. ...
The Public-Key Infrastructure (PKI) is a technology that can meet these security services with its techniques and standards. ...
Also, it can be used as a reference for other organizations that need to establish a domain-trust relation with this organization. ...
doi:10.1109/icfcn.2012.6206857
fatcat:wsalhop7wjgyzbovjrvbkeqqnq
Government PKI Deployment and Usage in Taiwan
2004
Information & Security An International Journal
infrastructure and establishing electronic certification and security applications for executive administration. ...
Besides GPKI applications, PKI interoperability has become a major issue in Taiwan recently. ...
Public Key Infrastructure (PKI) and Privilege Management Infrastructure (PMI). ...
doi:10.11610/isij.1503
fatcat:zgxbnwvknbacvgegy2xnv5whsm
Information Assurance (IA)
[chapter]
2015
Soft Systems Thinking, Methodology and the Management of Change
Plan, design, and manage the implementation of the Key Management Infrastructure/PKI within the Department of Defense. 5.8.7. ...
The use of Public Key Infrastructure (PKI) certificates and biometrics for positive authentication shall be in accordance with published DoD policy and procedures. ...
Collections of interrelated processes, systems, and networks that provide a continual flow of information assurance services throughout the Department of Defense, e.g., the key management infrastructure ...
doi:10.1007/978-1-137-43269-8_14
fatcat:5nseynpvz5dlje2vsjpyyv4ygy
Identity Management Challenges for Intercloud Applications
[chapter]
2011
Communications in Computer and Information Science
Identity management services are one of the main candidates to be outsourced into the Intercloud, since they are one of the most common services needed by companies and organisations. ...
Intercloud notion is gaining a lot of attention lately from both enterprise and academia, not only because of its benefits and expected results but also due to the challenges that it introduces regarding ...
Acknowledgements The work in this paper was partly sponsored by the EC Framework Programme as part of the ICT PASSIVE project (grant agreeement no. 257644) and the ICT NESSoS project (grant agreement number ...
doi:10.1007/978-3-642-22365-5_24
fatcat:5efgmbehmzfffjhqp2kl2d5wma
Ensuring Data Confidentiality and Authentication through Encryption at Application Layer
2015
International Journal of Security and Its Applications
We introduce a tool that encrypts/decrypts the user data at application layer using public key infrastructure. ...
Cloud computing has emerged as a powerful and viable architecture to meet largescale and complex computational needs of the organizations. ...
Public Key Infrastructure (PKI) PKI consists of various procedures, communication protocols, policies and cryptographic algorithms to ensure secure communication among distinct entities in a comprehensive ...
doi:10.14257/ijsia.2015.9.11.16
fatcat:3ksp6leonjgqtdj7bvobv5n5bm
Personalized Data Set For Analysis
2010
International Journal of Database Management Systems
data set of an organization are being outsourced for testing, consolidation and data management. ...
Here, an approach is presented where a new service layer is introduced, by data governance group, in the architecture for data management and can be used for preserving privacy of sensitive information ...
He has authored the book entitled PKI -Concepts, Design and Deployment, published by Tata McGraw-Hill, and also co-authored more than 70 research papers. ...
doi:10.5121/ijdms.2010.2404
fatcat:gi6pexxxrvgpze5i7kn4fww4p4
Private key infrastructure: balancing computer transmission privacy with changing technology and security demands
2005
Computer Standards & Interfaces
This paper explores the pros and cons of this new technology, develops a framework for the evaluation and implementation of PKI, and finally presents case studies of PKI implementation. D ...
The purpose of this study is to explore the emerging technology called Public Key Infrastructure (PKI) that is used to secure electronic transmissions over the Internet. ...
for use in the current infrastructure of over 4 million participants. ...
doi:10.1016/j.csi.2004.10.010
fatcat:pq6muvun3za5latv4vmgdqyyry
Managing multiple and dependable identities
2003
IEEE Internet Computing
Acknowledgments The work reported in this paper was partially supported by the EU-funded Roadmap for Advanced Research in Privacy and Identity Management (RAPID) and by the Italian Ministry for Research ...
However, some of the more recent managed PKI environments reduce this burden by partially or totally outsourcing digital certificate management -for example, via high-performance appliances (see www.singlesignon.net ...
Achieving the research goals outlined in this article will enable a new generation of advanced MDDI services on the global information infrastructure. ...
doi:10.1109/mic.2003.1250581
fatcat:qfduchqwg5difhjnq4ocsymioe
Embedding X.509 Digital Certificates in Three-Dimensional Models for Authentication, Authorization, and Traceability of Product Data
2016
Journal of Computing and Information Science in Engineering
Finally, the paper draws conclusions and provides recommendations for further research into using X.509 certificates in product lifecycle management (PLM) workflows to enable a product lifecycle of trust ...
This paper provides a review of the use of X.509 certificates and proposes a solution for embedding X.509 digital certificates in 3D models for authentication, authorization, and traceability of product ...
Acknowledgments The authors wish to thank Allison Barnard Feeney, Mark Carlisle, and Vijay Srinivasan from NIST and the peerreviewers for their comments and input to this paper. ...
doi:10.1115/1.4034131
pmid:27840596
pmcid:PMC5103327
fatcat:rd5zytfm65d3bd4f7mccvvjmwy
Accessing Secured Data in Cloud Computing Environment
2015
International journal of network security and its applications
An efficient encryption technique presented in this paper can be used for secure access to and storage of data on public cloud server, moving and searching encrypted data through communication channels ...
Answering a query does not depend on it size and done in a constant time. Data access is managed by the data owner. The proposed schema allows unauthorized modifications detection. ...
IaaS (Infrastructure as a Service) -storage and networking services or virtual servers to subscribers; PaaS ( Platform as a Service) -an environment for development of new applications that run on the ...
doi:10.5121/ijnsa.20157102
fatcat:227danc7vze4rcbk4tozzeaef4
Cloud Computing: Security and Reliability Issues
2013
Communications of the IBIMA
Traditional techniques, based on cryptography, can address some of these challenges to a certain degree. We will argue that they may not be efficient for use in cloud environments. ...
Public key infrastructure provides the foundations for provision of some essential security services. ...
Cross certification and interoperability issues within PKI infrastructure may lead to trust management chaos as it is impractical to have a singular trusted CA for all the countries, domains and businesses ...
doi:10.5171/2013.655710
fatcat:ds74gewbiff3didbsfjrtwjz7a
A Reference Design for Secure Cloud Bursting
[chapter]
2014
Building the Infrastructure for Cloud Security
This infrastructure reference design is a way to highlight the essential elements for secure hybrid cloud services. ...
We'll explain the nature of this new capability and examine the architecture and reference design for this capability in the next few pages. ...
The organization: a. Conducts an organizational assessment of risk prior to the acquisition or outsourcing of dedicated information security services. b. ...
doi:10.1007/978-1-4302-6146-9_9
fatcat:onpcnfn2uvfwdho3mjoug53unm
A Review of Data Security Issues in Cloud Environment
2013
International Journal of Computer Applications
But yet many numbers of business-critical applications, organizations, large enterprise wouldn't move them to cloud because of security issues. ...
In this paper we analyzed security and privacy issues associated with cloud computing and describes some reason for why all IT company are not used cloud and give solution of some issues. ...
The key management can be done through common PKI infrastructure. For solution of C4 New form of encryption, called Homomorphic Encryption is used [16] . ...
doi:10.5120/14254-2352
fatcat:viguzaxsmneclmwaunx3l63qli
ACVS: An Advanced Certificate Validation Service in Service-Oriented Architectures
2008
2008 Third International Conference on Internet and Web Applications and Services
However, XKMS only provides a simple validation mechanism that does not allow clients to specify some useful aspects needed for purposes of long term validation, such as trust anchors, information to store ...
In order to gather these evidences, clients have to support several PKI-compliant protocols. Then, with the aim of simplifying this task XKMS appeared. ...
Acknowledgements This work has been funded by ECOSPACE "Integrated Project on e-Professional Collaboration Space" (FP6 IST-035208) and Programa de Ayuda a los Grupos de Excelencia de la Fundación Séneca-Agencia ...
doi:10.1109/iciw.2008.84
dblp:conf/iciw/Ruiz-MartinezSMPG08
fatcat:xyjlikytwjdchma3tzubjj5cku
Analysis of Security Algorithms for Data Sharing in Cloud Computing
2018
IJARCCE
Cloud computing provides a adaptable, flexible and convenient way for sharing the data that brings plethora of benefits for both the industry and community. ...
But often there is a natural resistance for individual users/industry to directly outsource the data to be shared on to the cloud server as the data often might contain sensitive information. ...
IBE eradicates the need for providing a public key infrastructure (PKI). ...
doi:10.17148/ijarcce.2018.799
fatcat:3hbleteycvevjixbdcjhpeo7qi
« Previous
Showing results 1 — 15 out of 415 results