Filters








415 Hits in 11.0 sec

Development of Certificate Authority services for web applications

Sufyan Faraj Al-Janabi, Amer Kais Obaid
2012 2012 International Conference on Future Communication Networks  
A PKI system works by having a Certificate Authority (CA) for issuing public-key certificates.  ...  The Public-Key Infrastructure (PKI) is a technology that can meet these security services with its techniques and standards.  ...  Also, it can be used as a reference for other organizations that need to establish a domain-trust relation with this organization.  ... 
doi:10.1109/icfcn.2012.6206857 fatcat:wsalhop7wjgyzbovjrvbkeqqnq

Government PKI Deployment and Usage in Taiwan

Chung-Ming Ou, Chuan-Te Ho, Hwai-Ling Shan
2004 Information & Security An International Journal  
infrastructure and establishing electronic certification and security applications for executive administration.  ...  Besides GPKI applications, PKI interoperability has become a major issue in Taiwan recently.  ...  Public Key Infrastructure (PKI) and Privilege Management Infrastructure (PMI).  ... 
doi:10.11610/isij.1503 fatcat:zgxbnwvknbacvgegy2xnv5whsm

Information Assurance (IA) [chapter]

Brian Wilson, Kees Van Haperen
2015 Soft Systems Thinking, Methodology and the Management of Change  
Plan, design, and manage the implementation of the Key Management Infrastructure/PKI within the Department of Defense. 5.8.7.  ...  The use of Public Key Infrastructure (PKI) certificates and biometrics for positive authentication shall be in accordance with published DoD policy and procedures.  ...  Collections of interrelated processes, systems, and networks that provide a continual flow of information assurance services throughout the Department of Defense, e.g., the key management infrastructure  ... 
doi:10.1007/978-1-137-43269-8_14 fatcat:5nseynpvz5dlje2vsjpyyv4ygy

Identity Management Challenges for Intercloud Applications [chapter]

David Núñez, Isaac Agudo, Prokopios Drogkaris, Stefanos Gritzalis
2011 Communications in Computer and Information Science  
Identity management services are one of the main candidates to be outsourced into the Intercloud, since they are one of the most common services needed by companies and organisations.  ...  Intercloud notion is gaining a lot of attention lately from both enterprise and academia, not only because of its benefits and expected results but also due to the challenges that it introduces regarding  ...  Acknowledgements The work in this paper was partly sponsored by the EC Framework Programme as part of the ICT PASSIVE project (grant agreeement no. 257644) and the ICT NESSoS project (grant agreement number  ... 
doi:10.1007/978-3-642-22365-5_24 fatcat:5efgmbehmzfffjhqp2kl2d5wma

Ensuring Data Confidentiality and Authentication through Encryption at Application Layer

Kaleem Ullah, M. N. A. Khan
2015 International Journal of Security and Its Applications  
We introduce a tool that encrypts/decrypts the user data at application layer using public key infrastructure.  ...  Cloud computing has emerged as a powerful and viable architecture to meet largescale and complex computational needs of the organizations.  ...  Public Key Infrastructure (PKI) PKI consists of various procedures, communication protocols, policies and cryptographic algorithms to ensure secure communication among distinct entities in a comprehensive  ... 
doi:10.14257/ijsia.2015.9.11.16 fatcat:3ksp6leonjgqtdj7bvobv5n5bm

Personalized Data Set For Analysis

Vishal Gupta, Ashutosh Saxena
2010 International Journal of Database Management Systems  
data set of an organization are being outsourced for testing, consolidation and data management.  ...  Here, an approach is presented where a new service layer is introduced, by data governance group, in the architecture for data management and can be used for preserving privacy of sensitive information  ...  He has authored the book entitled PKI -Concepts, Design and Deployment, published by Tata McGraw-Hill, and also co-authored more than 70 research papers.  ... 
doi:10.5121/ijdms.2010.2404 fatcat:gi6pexxxrvgpze5i7kn4fww4p4

Private key infrastructure: balancing computer transmission privacy with changing technology and security demands

Donna M. Evans, David C. Yen
2005 Computer Standards & Interfaces  
This paper explores the pros and cons of this new technology, develops a framework for the evaluation and implementation of PKI, and finally presents case studies of PKI implementation. D  ...  The purpose of this study is to explore the emerging technology called Public Key Infrastructure (PKI) that is used to secure electronic transmissions over the Internet.  ...  for use in the current infrastructure of over 4 million participants.  ... 
doi:10.1016/j.csi.2004.10.010 fatcat:pq6muvun3za5latv4vmgdqyyry

Managing multiple and dependable identities

E. Damiani, S. De Capitani diVimercati, P. Samarati
2003 IEEE Internet Computing  
Acknowledgments The work reported in this paper was partially supported by the EU-funded Roadmap for Advanced Research in Privacy and Identity Management (RAPID) and by the Italian Ministry for Research  ...  However, some of the more recent managed PKI environments reduce this burden by partially or totally outsourcing digital certificate management -for example, via high-performance appliances (see www.singlesignon.net  ...  Achieving the research goals outlined in this article will enable a new generation of advanced MDDI services on the global information infrastructure.  ... 
doi:10.1109/mic.2003.1250581 fatcat:qfduchqwg5difhjnq4ocsymioe

Embedding X.509 Digital Certificates in Three-Dimensional Models for Authentication, Authorization, and Traceability of Product Data

Thomas D. Hedberg, Sylvere Krima, Jaime A. Camelio
2016 Journal of Computing and Information Science in Engineering  
Finally, the paper draws conclusions and provides recommendations for further research into using X.509 certificates in product lifecycle management (PLM) workflows to enable a product lifecycle of trust  ...  This paper provides a review of the use of X.509 certificates and proposes a solution for embedding X.509 digital certificates in 3D models for authentication, authorization, and traceability of product  ...  Acknowledgments The authors wish to thank Allison Barnard Feeney, Mark Carlisle, and Vijay Srinivasan from NIST and the peerreviewers for their comments and input to this paper.  ... 
doi:10.1115/1.4034131 pmid:27840596 pmcid:PMC5103327 fatcat:rd5zytfm65d3bd4f7mccvvjmwy

Accessing Secured Data in Cloud Computing Environment

Hasan Omar Al-Sakran
2015 International journal of network security and its applications  
An efficient encryption technique presented in this paper can be used for secure access to and storage of data on public cloud server, moving and searching encrypted data through communication channels  ...  Answering a query does not depend on it size and done in a constant time. Data access is managed by the data owner. The proposed schema allows unauthorized modifications detection.  ...  IaaS (Infrastructure as a Service) -storage and networking services or virtual servers to subscribers; PaaS ( Platform as a Service) -an environment for development of new applications that run on the  ... 
doi:10.5121/ijnsa.20157102 fatcat:227danc7vze4rcbk4tozzeaef4

Cloud Computing: Security and Reliability Issues

Farhad Ahamed, Seyed Shahrestani, Athula Ginige
2013 Communications of the IBIMA  
Traditional techniques, based on cryptography, can address some of these challenges to a certain degree. We will argue that they may not be efficient for use in cloud environments.  ...  Public key infrastructure provides the foundations for provision of some essential security services.  ...  Cross certification and interoperability issues within PKI infrastructure may lead to trust management chaos as it is impractical to have a singular trusted CA for all the countries, domains and businesses  ... 
doi:10.5171/2013.655710 fatcat:ds74gewbiff3didbsfjrtwjz7a

A Reference Design for Secure Cloud Bursting [chapter]

Raghu Yeluri, Enrique Castro-Leon
2014 Building the Infrastructure for Cloud Security  
This infrastructure reference design is a way to highlight the essential elements for secure hybrid cloud services.  ...  We'll explain the nature of this new capability and examine the architecture and reference design for this capability in the next few pages.  ...  The organization: a. Conducts an organizational assessment of risk prior to the acquisition or outsourcing of dedicated information security services. b.  ... 
doi:10.1007/978-1-4302-6146-9_9 fatcat:onpcnfn2uvfwdho3mjoug53unm

A Review of Data Security Issues in Cloud Environment

Sahil Zatakiya, Pranav Tank
2013 International Journal of Computer Applications  
But yet many numbers of business-critical applications, organizations, large enterprise wouldn't move them to cloud because of security issues.  ...  In this paper we analyzed security and privacy issues associated with cloud computing and describes some reason for why all IT company are not used cloud and give solution of some issues.  ...  The key management can be done through common PKI infrastructure. For solution of C4 New form of encryption, called Homomorphic Encryption is used [16] .  ... 
doi:10.5120/14254-2352 fatcat:viguzaxsmneclmwaunx3l63qli

ACVS: An Advanced Certificate Validation Service in Service-Oriented Architectures

Antonio Ruiz-Mart, Daniel S, C. Inmaculada Mar, Manuel Gil-P, Antonio F. G
2008 2008 Third International Conference on Internet and Web Applications and Services  
However, XKMS only provides a simple validation mechanism that does not allow clients to specify some useful aspects needed for purposes of long term validation, such as trust anchors, information to store  ...  In order to gather these evidences, clients have to support several PKI-compliant protocols. Then, with the aim of simplifying this task XKMS appeared.  ...  Acknowledgements This work has been funded by ECOSPACE "Integrated Project on e-Professional Collaboration Space" (FP6 IST-035208) and Programa de Ayuda a los Grupos de Excelencia de la Fundación Séneca-Agencia  ... 
doi:10.1109/iciw.2008.84 dblp:conf/iciw/Ruiz-MartinezSMPG08 fatcat:xyjlikytwjdchma3tzubjj5cku

Analysis of Security Algorithms for Data Sharing in Cloud Computing

K. Lakshmi, Sk. Mahboob Basha
2018 IJARCCE  
Cloud computing provides a adaptable, flexible and convenient way for sharing the data that brings plethora of benefits for both the industry and community.  ...  But often there is a natural resistance for individual users/industry to directly outsource the data to be shared on to the cloud server as the data often might contain sensitive information.  ...  IBE eradicates the need for providing a public key infrastructure (PKI).  ... 
doi:10.17148/ijarcce.2018.799 fatcat:3hbleteycvevjixbdcjhpeo7qi
« Previous Showing results 1 — 15 out of 415 results