A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2010; you can also visit the original URL.
The file type is application/pdf
.
Filters
A PKI Approach Targeting the Provision of a Minimum Security Level within Internet
2007
Fourth European Conference on Universal Multiservice Networks (ECUMN'07)
In this context, this paper targets the provision of a minimum security level within Internet by defining a PKI solution based on LDAP and DNS (extended with DNSSEC). ...
If not targeted at the beginning, Information System Security became rapidly a key challenge for professionals and strong security solutions emerged on the market mainly for professionals. ...
Provision of a minimum security level within Internet This minimum security level is built on the idea of interconnecting two PKI, a DNSSEC PKI and an LDAP PKI. ...
doi:10.1109/ecumn.2007.3
dblp:conf/ecumn/Laurent-Maknavicius07
fatcat:kpnvqd5awfcg7hzog46k5icrcy
Securing BGP — A Literature Survey
2011
IEEE Communications Surveys and Tutorials
One of the major concerns related to BGP is its lack of effective security measures, and as a result the routing infrastructure of the Internet is vulnerable to various forms of attack. ...
Some open questions on the next steps in the study of BGP security are posed. ...
A similar approach within the IRR framework that integrates the concept of an address and AS PKI could make provision for signed responses in a way that allows the IRR client to authenticate that the response ...
doi:10.1109/surv.2011.041010.00041
fatcat:lkobfgkzpjhg7dn7q4llkyajhm
An Innovative Policy-Based Cross Certification Methodology for Public Key Infrastructures
[chapter]
2005
Lecture Notes in Computer Science
The methodology consists in the formalization of a policy template and in the building of a reference evaluation model. Proposed approach can be applied on several models of Cross Certification. ...
The evaluation process is based on the evaluation of the Certificate policies which are usually expressed in a not formalized (and native language) way. ...
number of Local Security Levels for that provision. ...
doi:10.1007/11533733_7
fatcat:lq7y5yzzlbdrzj7chqeonb4sfm
Leveraging the e-passport PKI to Achieve Interoperable Security for e-government Cross Border Services
[chapter]
2012
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Cross border availability of e-government services requires such a security infrastructure to provide a horizontal level of service across all implicated entities. ...
This paper identifies the unique characteristics of a necessary interoperable security infrastructure and towards this goal explores the restrictions of current authentication approaches. ...
Although the e-passport does not contain an X.509.v3 certificate and it is not designed for everyday Internet transactions, it exhibits all-but-one of the characteristics of a typical PKI-enabled smart ...
doi:10.1007/978-3-642-33448-1_14
fatcat:jfnfas4yhjc33fasknb64a6kpa
Transitioning to a Hyperledger Fabric Quantum-Resistant Classical Hybrid Public Key Infrastructure
2019
The Journal of British Blockchain Association
to the operational security of its network. ...
Quantum computing poses a devastating impact on PKI and estimates of its large-scale commercial arrival should not be underestimated and cannot be predicted. ...
targeting various security levels. ...
doi:10.31585/jbba-2-2-(4)2019
fatcat:mmzq3d42bzbwhd5fw3dky5aciu
Procedurally Provisioned Access Control for Robotic Systems
2018
2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)
Security of robotics systems, as well as of the related middleware infrastructures, is a critical issue for industrial and domestic IoT, and it needs to be continuously assessed throughout the whole development ...
In this work, we introduce a framework for procedural provisioning access control policies for robotic software, as well as for verifying the compliance of generated transport artifacts and decision point ...
Work partially supported by CINI Cybersecurity National Laboratory within the project "FilieraSicura". ...
doi:10.1109/iros.2018.8594462
dblp:conf/iros/WhiteCCC18
fatcat:6ru2dhyhw5bn7apz6rznenxs54
Security in Programmable Network Infrastructures: The Integration of Network and Application Solutions
[chapter]
2000
Lecture Notes in Computer Science
Other approaches propose solutions at a higher level of abstraction, to exploit the flexibility and extensibility typical of the application layer [3]. ...
A security framework for programmable networks may provide security solutions at different levels of abstraction. ...
Acknowledgments Investigation supported by the Italian "Consiglio Nazionale delle Ricerche" in the framework of the Project "Global Applications in the Internet Area: Models and Programming Environments ...
doi:10.1007/3-540-40057-5_20
fatcat:nvr2yioqc5dtliowmogcnorfci
Who ya gonna call? (Alerting Authorities): Measuring Namespaces, Web Certificates, and DNSSEC
[article]
2020
arXiv
pre-print
We observe partial heightened security relative to the global Internet trends, yet find cause for concern as about 80% of service providers fail to deploy measures of trustworthy service provision. ...
This includes catering to secure identification of service, secure resolution of name to network service, and content security and privacy as a minimum base for trustworthy communication. ...
This work was supported in parts by the German Federal Ministry of Education and Research (BMBF) within the projects I3 and Deutsches Internet-Institut (grant no. 16DII111). ...
arXiv:2008.10497v2
fatcat:2qv4vpwqp5gozpqgaz3f75bdcq
Securing V2X Communications for the Future
2019
Proceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19
We debate on the advantages offered and underline the specifis of such a novel approach based on the use of advanced cryptographic primitives, using Direct Anonymous Attestation (DAA) as a concrete example ...
However, despite the security and privacy guarantees offered by such solutions, there are still a number of challenges to be conquered. ...
communication should be kept to the minimum and should be no more than what is required for the normal operation of the system. • Conditional Anonymity: Vehicles should be anonymous within a set of potential ...
doi:10.1145/3339252.3340523
dblp:conf/IEEEares/GiannetsosK19
fatcat:ejxldlezsbfypd2fj2azjza5u4
Addressing cloud computing security issues
2012
Future generations computer systems
The solution, presents a horizontal level of service, available to all implicated entities, that realizes a security mesh, within which essential trust is maintained. (D. Zissis), Dlek@aegean.gr (D. ...
The Third Party is tasked with assuring specific security characteristics within a distributed information system, while realizing a trust mesh between involved entities, forming federations of clouds. ...
The solution, presents a horizontal level of service, available to all implicated entities, that realizes a security mesh, within which essential trust is maintained. ...
doi:10.1016/j.future.2010.12.006
fatcat:j7wh6nux25ha7hlpuknlw443xi
Identity management and trusted interaction in Internet and mobile computing
2014
IET Information Security
The aim of this article is to present an overview of central aspects of identity management in Internet and mobile computing with respect to security and trust. ...
The convergence of Internet and mobile computing enables personalised access to online services anywhere and anytime. ...
This is because the actual implementation of TLS and the Browser PKI has vulnerabilities that make them relatively easy targets of attack. ...
doi:10.1049/iet-ifs.2012.0133
fatcat:idu3dxw5cfdezliw4rlkbtpzly
A Survey on Smart Home Authentication: Toward Secure, Multi-Level and Interaction-based Identification
2021
IEEE Access
The analysis leads to the specification of a set of desirable security requirements for the design of authentication solutions for SHome. ...
With the increased number and reduced cost of smart devices, Internet of Things (IoT) applications such as smart home (SHome) are increasingly popular. ...
Although this approach may enhance the security level of PUF based protocols, it adds additional authentication overhead. ...
doi:10.1109/access.2021.3114152
fatcat:qgzglvwqaja6rjjka35byxrxzm
Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things
2015
Sensors
Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things. ...
As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. ...
Jorge Bernal Bernabe contributed to the design of the alternatives, experimental evaluation and analysis of the different approaches. M. Victoria Moreno and Antonio F. ...
doi:10.3390/s150715611
pmid:26140349
pmcid:PMC4541847
fatcat:lj6fxvebhbeq3eracqxlv7ijfq
Security-Oriented Architecture for Managing IoT Deployments
2019
Symmetry
Assuring security and privacy is one of the key issues affecting the Internet of Things (IoT), mostly due to its distributed nature. ...
A Kerberos-like ticket-based approach is used to establish secure sessions. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/sym11101315
fatcat:lxpwdrdxxfc3pg57d2qlryji2y
Securing e-Government and e-Voting with an open cloud computing architecture
2011
Government Information Quarterly
In turn, adopting a cloud computing approach for electronic government and electronic voting solutions is investigated, reviewing the architecture within the previously described context. ...
, exploring the notion of trust and transparency within this context. ...
Commonly, these attacks involve simply saturating the target machine with external internet requests. ...
doi:10.1016/j.giq.2010.05.010
fatcat:7s7bumeycjbfnppjnnvu3jdloi
« Previous
Showing results 1 — 15 out of 860 results