860 Hits in 7.3 sec

A PKI Approach Targeting the Provision of a Minimum Security Level within Internet

Maryline Laurent-Maknavicius
2007 Fourth European Conference on Universal Multiservice Networks (ECUMN'07)  
In this context, this paper targets the provision of a minimum security level within Internet by defining a PKI solution based on LDAP and DNS (extended with DNSSEC).  ...  If not targeted at the beginning, Information System Security became rapidly a key challenge for professionals and strong security solutions emerged on the market mainly for professionals.  ...  Provision of a minimum security level within Internet This minimum security level is built on the idea of interconnecting two PKI, a DNSSEC PKI and an LDAP PKI.  ... 
doi:10.1109/ecumn.2007.3 dblp:conf/ecumn/Laurent-Maknavicius07 fatcat:kpnvqd5awfcg7hzog46k5icrcy

Securing BGP — A Literature Survey

Geoff Huston, Mattia Rossi, Grenville Armitage
2011 IEEE Communications Surveys and Tutorials  
One of the major concerns related to BGP is its lack of effective security measures, and as a result the routing infrastructure of the Internet is vulnerable to various forms of attack.  ...  Some open questions on the next steps in the study of BGP security are posed.  ...  A similar approach within the IRR framework that integrates the concept of an address and AS PKI could make provision for signed responses in a way that allows the IRR client to authenticate that the response  ... 
doi:10.1109/surv.2011.041010.00041 fatcat:lkobfgkzpjhg7dn7q4llkyajhm

An Innovative Policy-Based Cross Certification Methodology for Public Key Infrastructures [chapter]

Valentina Casola, Antonino Mazzeo, Nicola Mazzocca, Massimiliano Rak
2005 Lecture Notes in Computer Science  
The methodology consists in the formalization of a policy template and in the building of a reference evaluation model. Proposed approach can be applied on several models of Cross Certification.  ...  The evaluation process is based on the evaluation of the Certificate policies which are usually expressed in a not formalized (and native language) way.  ...  number of Local Security Levels for that provision.  ... 
doi:10.1007/11533733_7 fatcat:lq7y5yzzlbdrzj7chqeonb4sfm

Leveraging the e-passport PKI to Achieve Interoperable Security for e-government Cross Border Services [chapter]

Dimitrios Lekkas, Dimitrios Zissis
2012 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Cross border availability of e-government services requires such a security infrastructure to provide a horizontal level of service across all implicated entities.  ...  This paper identifies the unique characteristics of a necessary interoperable security infrastructure and towards this goal explores the restrictions of current authentication approaches.  ...  Although the e-passport does not contain an X.509.v3 certificate and it is not designed for everyday Internet transactions, it exhibits all-but-one of the characteristics of a typical PKI-enabled smart  ... 
doi:10.1007/978-3-642-33448-1_14 fatcat:jfnfas4yhjc33fasknb64a6kpa

Transitioning to a Hyperledger Fabric Quantum-Resistant Classical Hybrid Public Key Infrastructure

Robert Campbell
2019 The Journal of British Blockchain Association  
to the operational security of its network.  ...  Quantum computing poses a devastating impact on PKI and estimates of its large-scale commercial arrival should not be underestimated and cannot be predicted.  ...  targeting various security levels.  ... 
doi:10.31585/jbba-2-2-(4)2019 fatcat:mmzq3d42bzbwhd5fw3dky5aciu

Procedurally Provisioned Access Control for Robotic Systems

Ruffin White, Henrik I. Christensen, Gianluca Caiazza, Agostino Cortesi
2018 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)  
Security of robotics systems, as well as of the related middleware infrastructures, is a critical issue for industrial and domestic IoT, and it needs to be continuously assessed throughout the whole development  ...  In this work, we introduce a framework for procedural provisioning access control policies for robotic software, as well as for verifying the compliance of generated transport artifacts and decision point  ...  Work partially supported by CINI Cybersecurity National Laboratory within the project "FilieraSicura".  ... 
doi:10.1109/iros.2018.8594462 dblp:conf/iros/WhiteCCC18 fatcat:6ru2dhyhw5bn7apz6rznenxs54

Security in Programmable Network Infrastructures: The Integration of Network and Application Solutions [chapter]

Paolo Bellavista, Antonio Corradi, Rebecca Montanari, Cesare Stefanelli
2000 Lecture Notes in Computer Science  
Other approaches propose solutions at a higher level of abstraction, to exploit the flexibility and extensibility typical of the application layer [3].  ...  A security framework for programmable networks may provide security solutions at different levels of abstraction.  ...  Acknowledgments Investigation supported by the Italian "Consiglio Nazionale delle Ricerche" in the framework of the Project "Global Applications in the Internet Area: Models and Programming Environments  ... 
doi:10.1007/3-540-40057-5_20 fatcat:nvr2yioqc5dtliowmogcnorfci

Who ya gonna call? (Alerting Authorities): Measuring Namespaces, Web Certificates, and DNSSEC [article]

Pouyan Fotouhi Tehrani, Eric Osterweil, Jochen H. Schiller, Thomas C. Schmidt, Matthias Wählisch
2020 arXiv   pre-print
We observe partial heightened security relative to the global Internet trends, yet find cause for concern as about 80% of service providers fail to deploy measures of trustworthy service provision.  ...  This includes catering to secure identification of service, secure resolution of name to network service, and content security and privacy as a minimum base for trustworthy communication.  ...  This work was supported in parts by the German Federal Ministry of Education and Research (BMBF) within the projects I3 and Deutsches Internet-Institut (grant no. 16DII111).  ... 
arXiv:2008.10497v2 fatcat:2qv4vpwqp5gozpqgaz3f75bdcq

Securing V2X Communications for the Future

Thanassis Giannetsos, Ioannis Krontiris
2019 Proceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19  
We debate on the advantages offered and underline the specifis of such a novel approach based on the use of advanced cryptographic primitives, using Direct Anonymous Attestation (DAA) as a concrete example  ...  However, despite the security and privacy guarantees offered by such solutions, there are still a number of challenges to be conquered.  ...  communication should be kept to the minimum and should be no more than what is required for the normal operation of the system. • Conditional Anonymity: Vehicles should be anonymous within a set of potential  ... 
doi:10.1145/3339252.3340523 dblp:conf/IEEEares/GiannetsosK19 fatcat:ejxldlezsbfypd2fj2azjza5u4

Addressing cloud computing security issues

Dimitrios Zissis, Dimitrios Lekkas
2012 Future generations computer systems  
The solution, presents a horizontal level of service, available to all implicated entities, that realizes a security mesh, within which essential trust is maintained. (D. Zissis), (D.  ...  The Third Party is tasked with assuring specific security characteristics within a distributed information system, while realizing a trust mesh between involved entities, forming federations of clouds.  ...  The solution, presents a horizontal level of service, available to all implicated entities, that realizes a security mesh, within which essential trust is maintained.  ... 
doi:10.1016/j.future.2010.12.006 fatcat:j7wh6nux25ha7hlpuknlw443xi

Identity management and trusted interaction in Internet and mobile computing

Audun Jøsang
2014 IET Information Security  
The aim of this article is to present an overview of central aspects of identity management in Internet and mobile computing with respect to security and trust.  ...  The convergence of Internet and mobile computing enables personalised access to online services anywhere and anytime.  ...  This is because the actual implementation of TLS and the Browser PKI has vulnerabilities that make them relatively easy targets of attack.  ... 
doi:10.1049/iet-ifs.2012.0133 fatcat:idu3dxw5cfdezliw4rlkbtpzly

A Survey on Smart Home Authentication: Toward Secure, Multi-Level and Interaction-based Identification

Salem AlJanah, Ning Zhang, Siok Wah Tay
2021 IEEE Access  
The analysis leads to the specification of a set of desirable security requirements for the design of authentication solutions for SHome.  ...  With the increased number and reduced cost of smart devices, Internet of Things (IoT) applications such as smart home (SHome) are increasingly popular.  ...  Although this approach may enhance the security level of PUF based protocols, it adds additional authentication overhead.  ... 
doi:10.1109/access.2021.3114152 fatcat:qgzglvwqaja6rjjka35byxrxzm

Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things

José Hernández-Ramos, Jorge Bernabe, M. Moreno, Antonio Skarmeta
2015 Sensors  
Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.  ...  As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society.  ...  Jorge Bernal Bernabe contributed to the design of the alternatives, experimental evaluation and analysis of the different approaches. M. Victoria Moreno and Antonio F.  ... 
doi:10.3390/s150715611 pmid:26140349 pmcid:PMC4541847 fatcat:lj6fxvebhbeq3eracqxlv7ijfq

Security-Oriented Architecture for Managing IoT Deployments

André Zúquete, Hélder Gomes, João Amaral, Carlos Oliveira
2019 Symmetry  
Assuring security and privacy is one of the key issues affecting the Internet of Things (IoT), mostly due to its distributed nature.  ...  A Kerberos-like ticket-based approach is used to establish secure sessions.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/sym11101315 fatcat:lxpwdrdxxfc3pg57d2qlryji2y

Securing e-Government and e-Voting with an open cloud computing architecture

Dimitrios Zissis, Dimitrios Lekkas
2011 Government Information Quarterly  
In turn, adopting a cloud computing approach for electronic government and electronic voting solutions is investigated, reviewing the architecture within the previously described context.  ...  , exploring the notion of trust and transparency within this context.  ...  Commonly, these attacks involve simply saturating the target machine with external internet requests.  ... 
doi:10.1016/j.giq.2010.05.010 fatcat:7s7bumeycjbfnppjnnvu3jdloi
« Previous Showing results 1 — 15 out of 860 results