Filters








92,313 Hits in 5.6 sec

A trusted process to digitally sign a document

Boris Balacheff, Liqun Chen, David Plaquin, Graeme Proudler
2001 Proceedings of the 2001 workshop on New security paradigms - NSPW '01  
This paper describes a method of increasing the trust in open computing platforms, such that a person can have confidence in producing a digital signature using open platforms.  ...  This paper proposes the digitally signing of a document by means of a trusted process within an open computing platform.  ...  CONCEPT OF A TRUSTED PROCESS FOR SIGNING A DOCUMENT In this section, we introduce the concept of signing a document using a trusted process within a computing platform.  ... 
doi:10.1145/508181.508184 fatcat:zde7bnfa7jambolc2q76lebisy

A trusted process to digitally sign a document

Boris Balacheff, Liqun Chen, David Plaquin, Graeme Proudler
2001 Proceedings of the 2001 workshop on New security paradigms - NSPW '01  
This paper describes a method of increasing the trust in open computing platforms, such that a person can have confidence in producing a digital signature using open platforms.  ...  This paper proposes the digitally signing of a document by means of a trusted process within an open computing platform.  ...  CONCEPT OF A TRUSTED PROCESS FOR SIGNING A DOCUMENT In this section, we introduce the concept of signing a document using a trusted process within a computing platform.  ... 
doi:10.1145/508171.508184 dblp:conf/nspw/BalacheffCPP01 fatcat:6d7cufh6nngefnhlfhigyka5vy

An Institutional Framework for Creating Authentic Digital Objects

Ronald Jantz
2009 International Journal of Digital Curation  
In the future, a scholar or researcher will want to know that a digital object is trusted - that it is authentic and reliable.  ...  Digital objects can be surrogates, resulting from a digitization process, or they can be objects whose only form is digital.  ...  signed using a trustworthy process.  ... 
doi:10.2218/ijdc.v4i1.79 fatcat:nkr2baoz6ngttngml23iqtt4ry

A PDF based digital signed document format for interoperable institutional structured data integrity

Luís A. Maia, Luís M. Valente, Manuel E. Correia, Lígia M. Ribeiro, Luís Antunes
2013 Material Science and Applied Chemistry  
Digitally signed structured XML documents provide an interesting solution to this problem.  ...  However, the evaluation of a paper document signature or stamp is not a straight forward process.  ...  Leveraging the possibility to have digitally signed XML documents, each document can be signed by a group of trusted signees, which are described in another set of documents where trust is recursively  ... 
doi:10.7250/eunis.2013.040 fatcat:spurrgjzszfgdnutiyi233a5f4

On Long-Term Storage of Digitally Signed Documents [chapter]

Jon Ølnes, Annikken Bonnevie Seip
2003 IFIP Advances in Information and Communication Technology  
The term "digital signature" is a metaphor that seeks to describe a particular use of public key cryptography by use of the well-known "signature" term.  ...  The political direction in most parts of the world is towards wide acceptance of electronic documents, and introduction of electronic signatures to replace handwritten ones.  ...  Following this process, one no longer has a signed document, but a witness statement that the document was signed.  ... 
doi:10.1007/978-0-387-35617-4_8 fatcat:36pndpva7jfg5ku6iho7sbyhku

Giving you back control of your data digital signing practical issues and the eCert solution

Lisha Chen-Wilson, Andrew M Gravell, David Argles
2011 2011 World Congress on Internet Security (WorldCIS-2011)  
Limitation of digital signing  ...  An eCertificate system represents the problem situation, and therefore is being used as case study, in a project called eCert, to research for the solution.  ...  Digital signing with independently distribute approach If we use a digitally signed document to replace the paper-based document within the existing issue, distribution, and verification process path,  ... 
doi:10.1109/worldcis17046.2011.5749890 fatcat:zaghy42dufduti5bukfvslqk3a

Outsourcing digital signatures: a solution to key management burden

Dimitrios Lekkas, Costas Lambrinoudakis, Sokratis K Katsikas
2006 Information Management & Computer Security  
Outsourcing digital signatures to a Trusted Third Party would be an elegant solution to the key management burden.  ...  Given that a signing request is strongly authenticated, we argue that passing the control of signature creation to a Signature Authority rather than the signer file:///C|/Documents and Settings/dlek/My  ...  The mechanics of our proposed solution are simple: The client wishing to produce a digital signature on a specific document, prepares a relevant request containing the document to be signed (or equivalently  ... 
doi:10.1108/09685220610707449 fatcat:byilowcihngpzffa4lmnasnktq

Advanced Biometric Electronic Signature in Practice - Lessons for the Public Administration from a Hungarian Case Study

Péter Máté Erdὄsi
2018 Central and Eastern European eDem and eGov Days  
After significant development of e-Administration, the question arose as to how the clients can sign documents electronically.  ...  In most of the cases, creating an advanced signature is easier and more cost-effective than creating a qualified signature, therefore it may be an alternative solution for signing documents in Public Administration  ...  on the entire document in order to enhance trust.  ... 
doi:10.24989/ocg.v331.34 fatcat:de6azpdoe5cdtiq4eovattoypm

Methodology and outcomes of using the Data Seal of Approval to benchmark and guide trust issues in an evolving European Research Data

Herve L'Hours
2020 Zenodo  
A key part of this collaboration is trust.  ...  This paper will outline the methodology and processes used to develop and define the requirements for trust in the emerging Consortium of European Social Science Data Archives (CESSDA).  ...  Provide a URL for the definition document.  ... 
doi:10.5281/zenodo.3780873 fatcat:zwesjpnca5gsfl5gtv4hgyjy2e

Cumulative notarization for long-term preservation of digital signatures

Dimitris Lekkas, Dimitris Gritzalis
2004 Computers & security  
The paper focuses on technology and trust issues related to the long-term validation of a digital signature.  ...  The long-term preservation of digitally signed documents may be approached and analyzed from various perspectives, i.e. future data readability, signature validity, storage media longevity, etc.  ...  a digital signature on a digital document. • Signature-verification-data: Data that is used to verify a digital signature and that is public or at least known to relying parties. • Digital certificate  ... 
doi:10.1016/j.cose.2004.03.002 fatcat:pglvps7btnfdnbzeqaz2ojyujq

Visual CAPTCHAs for Document Authentication

Igor Fischer, Thorsten Herfet
2006 2006 IEEE Workshop on Multimedia Signal Processing  
It can be a specialized, trusted cryptographic computer, e.g. a smartcard, but the path to it is generally not secure.  ...  If such a document is still recognizable by a human, he or she can be confident that it is authentic, or at least that no automated process has manipulated it.  ...  ACKNOWLEDGMENT The authors would like to thank Jerry Huxtable for his image filters and Sarmad Hussain for help with implementation.  ... 
doi:10.1109/mmsp.2006.285353 dblp:conf/mmsp/FischerH06 fatcat:znl7v7c4bfcaxpd4eh6crpp7im

Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs [chapter]

Adrian Spalka, Armin B. Cremers, Hanno Langweg
2001 IFIP Advances in Information and Communication Technology  
from Trojan horse programs during the process of creating digital signatures.  ...  Moreover, we examine three ways of storing and executing the signing software with respect to its susceptibility to Trojan horse programs and identify the most suitable combination.  ...  And since the cryptographic algorithms cannot be broken, Trojan horses are likely to subvert the process of digitally signing documents.  ... 
doi:10.1007/0-306-46998-7_28 fatcat:3bwlmbhxpjckvayjckhffnhal4

ELECTRONIC SIGNATURE, TOOL FOR OPTIMIZING THE MANAGEMENT OF INFORMATION IN ELECTRONIC FORMAT

Lucian SCÎRTOCEA
2022 STRATEGIES XXI: The Complex and Dynamic Nature of the Security Environment  
to the large volume of files and documents currently operated.  ...  The way of managing information in electronic format is a concern of specialists in both military and civilian fields in terms of optimizing the process of managing information in electronic format due  ...  If a message is digitally signed, any change to the message cancels its signature; 1 Trust Services' are a concept defined in Regulation 910/2014 to include electronic services, consisting of the creation  ... 
doi:10.53477/2668-6511-22-11 fatcat:vybocjhsqjdx7et2tjabmpup3q

Security and Trust in the Italian Legal Digital Signature Framework [chapter]

Stefano Zanero
2005 Lecture Notes in Computer Science  
We also show which countermeasures would be appropriate to reduce the risks. We show the reflex of these vulnerabilities on the trust-based framework which gives legal value to digital signatures.  ...  The early adoption of a national, legal digital signature framework in Italy has brought forth a series of problems and vulnerabilities.  ...  The decree was revolutionary for its time, giving to electronically signed documents (prepared with prescribed methods) the same value of signed paper documents, "trusting" them to show the will of the  ... 
doi:10.1007/11429760_3 fatcat:3t5t26p5pbbr3bpaudoagysiiq

The Use of Digital Watermarking for Intelligence Multimedia Document Distribution

Shing-Chi Cheung, Dickson K. W. Chiu, Cedric Ho
2008 Journal of Theoretical and Applied Electronic Commerce Research  
Digital watermarking is a promising technology to embed information as unperceivable signals in digital contents.  ...  The reinforcement of document distribution policies requires a concrete support of non-repudiation in the distribution process.  ...  Acknowledgments We thank Hanif Curreem for his assistance in the prototype implementation of the proposed document distribution protocol.  ... 
doi:10.4067/s0718-18762008000200008 fatcat:pphi7r44cbbmbfmkcsfovgbiii
« Previous Showing results 1 — 15 out of 92,313 results