Filters








10,511 Hits in 4.3 sec

A WWW based Certification Infrastructure for Secure Open Network Transactions [chapter]

Tomas Gustaysson
1996 IFIP Advances in Information and Communication Technology  
The paper describes the certification system and its use based on the WWW interface.  ...  The WWW interface can be used to provide easy user access to certification functions, as well as automatic on-line functionality for various security enhanced applications.  ...  Certification Management Messages We have adopted the PEM letter format for transporting the certification management messages over the HTTP protocol.  ... 
doi:10.1007/978-0-387-35083-7_14 fatcat:i5p5gsy2r5d7lcf5so4e3vfryu

A Collaborative Network Security Management System in Metropolitan Area Network

Beipeng Mu, Xinming Chen, Zhen Chen
2011 2011 Third International Conference on Communications and Mobile Computing  
NetSecu nodes are organized into a hierarchy architecture so they could realize different management or security functions. In each level, nodes formed a P2P networks for higher efficiency.  ...  This paper presents a design and implementation of collaborative network security management system (CNSMS), which organize the NetSecu nodes into a hybrid P2P and hierarchy architecture to share the security  ...  PKI and digital certificate Public Key Infrastructure (PKI) is a widely used mechanism to manage digital certificates.  ... 
doi:10.1109/cmc.2011.130 dblp:conf/ieeecmc/MuCC11 fatcat:axtfx7i2lvfmha7hogiz5sqnvy

Secure service-oriented architecture for mobile transactions

Feng Zhang, Sead Muftic, Gernot Schmoelzer
2011 2011 World Congress on Internet Security (WorldCIS-2011)  
The architecture comprises components, protocols, applications and interfaces and it provides various security services to various mobile applications: registration, certification, authentication, and  ...  These components support communication services at the network levelsending and receiving messages. The next tier is SAFE Communication Server.  ...  All smart cards are issued and managed by the SAFE Card Management System (CMS) comprising CMS Server and CMS Station.  ... 
doi:10.1109/worldcis17046.2011.5749898 fatcat:mrl2whrstjdcjl6n73rhj3ypzm

Practical and secure trust anchor management and usage

Carl Wallace, Geoff Beier
2010 Proceedings of the 9th Symposium on Identity and Trust on the Internet - IDTRUST '10  
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors.  ...  Unfortunately, widely used mechanisms, management models and usage practices related to trust anchors undermine security and impede flexibility.  ...  In some cases, a collection of trust anchors may be represented using a "certificates only" Cryptographic Message Syntax (CMS) SignedData message.  ... 
doi:10.1145/1750389.1750403 dblp:conf/idtrust/WallaceB10 fatcat:dm6tvthm2fesfpg72afx2dffhu

Transparent Proxy for Secure E-Mail

Juraj Michalák, Ladislav Hudec
2010 Journal of Electrical Engineering  
The security features include encryption and signing of transported messages.  ...  Transparent Proxy for Secure E-Mail The paper deals with the security of e-mail messages and e-mail server implementation by means of a transparent SMTP proxy.  ...  The cen-tral management server is designed for certificate distribution in the community 9 of our embedded systems but also a local administration web interface could be used to manage the local certificate  ... 
doi:10.2478/v10187-010-0026-3 fatcat:yito5etjmbc4lpkut5tgn7jpcu

Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO

Antonio Celesti, Maria Fazio, Massimo Villari
2017 Sensors  
However, things are different considering both message management and security.  ...  management and interactivity.  ...  a trusted Certification Authority (CA) through the Simple Certificate Enrollment Protocol (SCEP). • Signed message exchange.  ... 
doi:10.3390/s17020301 pmid:28178214 pmcid:PMC5335972 fatcat:hbzhaaeqmrh2npye4rrm3qchbe

A New Group Signature Scheme with Efficient Membership Revocation

Thu Thu Mon Oo
2014 International Journal of Science and Engineering Applications  
In this case, other group members and the outsiders from the group cannot see which member signed the messages.  ...  Moreover, the current methods of revocation property of the group signature scheme do not revoke to allow valid signature under an old secret key of the group manager.  ...  CM controls the group responsibilities that are divided into two authorities: the issuing manager (IM) and the opening manager (OM), and then CM creates all of the group keys.  The issuing manager (IM  ... 
doi:10.7753/ijsea0306.1002 fatcat:knoa7s6u5rfwfkc5mcyvetsetm

Practical and Secure E-Mail System (PractiSES) [chapter]

Albert Levi, Mahmut Özcan
2004 Lecture Notes in Computer Science  
Since on-demand fetching of public keys is aimed in PractiSES, use of certificates is limited for inter-domain communications only; no certificates are used within a domain.  ...  PractiSES clients manage their public keys and obtain public keys of other users by using unique, secure and user-transparent protocols.  ...  PractiSES takes advantage over S/MIME applications by escaping use of certificates for masses and over PGP by less complicated trust mechanism based on a trusted third party.  ... 
doi:10.1007/978-3-540-30198-1_42 fatcat:c5zd7dqlezg4zlm4owwo67ct3y

Application-Layer Security Protocols for Networks [chapter]

Bill Stackpole
2007 Information Security Management Handbook, Sixth Edition  
With the advent of digital certificates and public key management standards, this deterrent has been largely overcome.  ...  Secure HTTP modes of operation include message protection, key management, and a transaction freshness mechanism.  ...  MPTP permits the signing of messages for authentication, integrity, and nonrepudiation using public-or secret -key cryptography and fully supports X.509 certificates.  ... 
doi:10.1201/9781439833032.ch152 fatcat:wk3qynnhlnakdeg6hlbhvqte44

Updates to the HL7 2.5.1 Implementation Guide for Syndromic Surveillance

Emilie Lamb, Dave Trepanier, Shandy Dearth
2019 Online Journal of Public Health Informatics  
These include: specifications for persistent patient ID across venues of service, inclusion of the ICD-10-CM value set for diagnosis, removal of the ICD-9-CM requirement for testing and messages, modification  ...  document developed with the National Institute of Standards and Technology (NIST) to clarify validation policies and certification parameters.  ...  document developed with the National Institute of Standards and Technology (NIST) to clarify validation policies and certification parameters.  ... 
doi:10.5210/ojphi.v11i1.9726 fatcat:arwqxg76b5gspl5grvlfqkk44y

"Johnny, you are fired!" – Spoofing OpenPGP and S/MIME Signatures in Emails

Jens Müller, Marcus Brinkmann, Damian Poddebniak, Hanno Böck, Sebastian Schinzel, Juraj Somorovsky, Jörg Schwenk
2019 Zenodo  
Digital signatures are supposed to guarantee authenticity and integrity of messages.  ...  . (4) We analyze weaknesses in the binding of signed messages to the sender identity. (5) We systematically test email clients for UI redressing attacks.  ...  CMS attacks. Cryptographic Message Syntax (CMS) is a versatile standard for signed and encrypted messages within the X.509 public-key infrastructure.  ... 
doi:10.5281/zenodo.3610262 fatcat:dnaaczxb3vcslbtjcsrycvxbba

CMS Run Registry: Data Certification Bookkeeping and Publication System

V Rapsevicius
2011 Journal of Physics, Conference Series  
The Run Registry of the CMS experiment at the LHC is the central tool for the tracking of the data quality monitoring and data certification workflows and the bookkeeping of the results.  ...  The Run Registry of the CMS experiment at the LHC is the central tool for the tracking of the data quality monitoring and data certification workflows and the bookkeeping of the results.  ...  The Run Registry (RR), reported here, is the central workflow management and tracking tool used to certify collected data, to keep track of the certification results and to expose them to the whole CMS  ... 
doi:10.1088/1742-6596/331/4/042038 fatcat:t3zugquykjbknmh2l2qdfagcdi

Design and Implementation of a Collaborative Communication Network for Video Conference Services

Mihăiță Rădoi, Military Technical Academy "Ferdinand I", Petrică Ciotîrnae, Military Technical Academy "Ferdinand I"
2020 Journal of Military Technology  
The ability to manage and monitor virtual meetings remains the responsibility of the open-source management tools.  ...  The call control and the dial plan are done through the Unified Call Manager software and WebRTC videoconferencing external access functionality is provided by configuring Traversal Using Relays around  ...  Voice over Internet Protocol, technology that incorporates a variety of methods for establishing bidirectional multimedia communications over the Internet or other networks based on IP packets switching  ... 
doi:10.32754/jmt.2020.1.02 fatcat:ta65npfvdzbmvkp6votnqdhmvi

An advanced certificate validation service and architecture based on XKMS

Antonio Ruiz-Martínez, Daniel Sánchez-Martínez, C. Inmaculada Marín-López, Manuel Gil-Pérez, Antonio F. Gómez-Skarmeta
2010 Software, Practice & Experience  
These formats extend Public Key Cryptographic Standard 7 (PKCS#7) [8]/Cryptographic Message Syntax (CMS) [9] and XML Signature (XMLDSig) [10] standards, respectively, in order to include these evidences  ...  XKMS appeared with the aim of simplifying the certificate management, but XKMS only supports a simple validation mechanism that does not provide the long term information needed for the CAdES/XAdES signature  ...  The e-signature of such documents is expressed according to formats such as PKCS#7 [8] /CMS [9] or XMLDSig [10] . Some of these signed documents have to remain valid over long periods of time.  ... 
doi:10.1002/spe.996 fatcat:7igufgcplbfkbmlaclt5tqcl6e

A Survey of Electronic Signature Solutions in Mobile Devices

Antonio Ruiz-Martínez, Daniel Sánchez-Martínez, María Martínez-Montesinos, Antonio F. Gómez-Skarmeta
2007 Journal of Theoretical and Applied Electronic Commerce Research  
Others work over the middleware of the mobile device and cryptographic providers.  ...  One is the certificate management, whose main purpose is to provide storage and retrieval of certificates, assignment of trust status to a certificate on an application by application basis, certificate  ...  Thus, the certificate can be used to verify that the key used to sign a document or message belongs to an identity.  ... 
doi:10.3390/jtaer2030024 fatcat:4abfv5frdrgw7mrgtiwbpzst3e
« Previous Showing results 1 — 15 out of 10,511 results