Filters








1,043 Hits in 10.5 sec

You Won't Be Needing These Any More: On Removing Unused Certificates from Trust Stores [chapter]

Henning Perl, Sascha Fahl, Matthew Smith
2014 Lecture Notes in Computer Science  
To find out which of these trusted root certificates are actually needed for the HTTPS ecosystem, we analyzed the trust stores of Windows, Linux, MacOS, Firefox, iOS and Android, discuss the interesting  ...  On the whole, we argue that this removal is an important first step to improve HTTPS security.  ...  we would like to analyze the trade-off between false positives and the size of the trust store, as well as look into mechanisms to restrict the capabilities of certificates on the Android platform.  ... 
doi:10.1007/978-3-662-45472-5_20 fatcat:q3wftd4pivd2los3k7zosjgv3e

Blockchain for Supply Chain and Manufacturing Industries and Future It Holds!

Virbahu Nandishwar Jain, Devesh Mishra, DAZ SI
2018 International Journal of Engineering Research and  
Some of these questions, touch you to the core, when you are a technology enthusiast and you want to know, the TRUTH.  ...  their journey on to this path.  ...  Teachers and other professionals could get inputs from trusted providers and thus be incentivized to do more CPD, if those experiences and learning opportunities were securely stored in a reputable system  ... 
doi:10.17577/ijertv7is090020 fatcat:dhxw45vmczfifo7fnse5mya2fa

Public key distribution through "cryptoIDs"

Trevor Perrin
2003 Proceedings of the 2003 workshop on New security paradigms - NSPW '03  
We show how these qualities can be achieved with simple and well-understood techniques.  ...  The chief technique is for each user to store a root key in a highly secure environment and use it to certify subkeys for use in more convenient environments.  ...  We would prefer to have Bob's trust information in a more concise form that could be stored in directories and address books, so that Alice could import this information from a directory into her address  ... 
doi:10.1145/986655.986669 dblp:conf/nspw/Perrin03 fatcat:ahnuqzzpdnh47lx6eubg3ajj4q

Webinos Project Deliverable: Phase 1 Security Framework

Webinos Consortium
2011 Zenodo  
It is expected that this will be updated as the platform is implemented and evaluated, and phase 2 of the project will propose further improvements and functionality.  ...  The security and privacy architecture aims to protect webinos users and systems from many threats, including those of malicious software, unauthorised data collection, violations of privacy and loss of  ...  PZP data will be stored locally on the device and, for PZHs, will be stored in the cloud. Data on both nodes need to be secured and managed from all threats.  ... 
doi:10.5281/zenodo.1154354 fatcat:ydjoaqcyvngfhpop3qyrbzp7r4

Uvos Manual

Berd Schuller
2013 Zenodo  
Those trusted certificates are also known as trust anchors and their collection is called a trust store.  ...  For instance if using der format the keyPath is mandatory as you need two DER files: one with certificate and one with the key (and the latter can not be guessed).  ... 
doi:10.5281/zenodo.6849 fatcat:cu2xqn7sgfd2zod5ueba2ve3qq

Bridging the Gap in Computer Security Warnings: A Mental Model Approach

Cristian Bravo-Lillo, Lorrie Faith Cranor, Julie Downs, Saranga Komanduri
2011 IEEE Security and Privacy  
However, research suggests that users frequently ignore these warnings. The authors describe a study designed to gain insight into how users perceive and respond to computer alerts.  ...  can be deduced from the warning). 1 However, many of the most common computer alerts fail to follow one or more of these guidelines.  ...  John: Oh, just, like, it has a valid name, a valid website, and it won't contain any harmful software, virus, or something else, and it could be trusted by any user or any other website.  ... 
doi:10.1109/msp.2010.198 fatcat:zqmt2harqbdudivkpsrz54gsaa

Apply Blockchain to Overcome Wi-Fi Vulnerabilities

Seong-Kyu (Steve) Kim
2019 Journal of multimedia information system  
entire system being shut down.  ...  one transaction information that constitutes a block was changed.  ...  Therefore, more time may be needed for the visible effect.  ... 
doi:10.33851/jmis.2019.6.3.139 fatcat:lmwir753kna6jgnwf7xbad645i

Java Cryptography

Jonathan Knudsen
1999 EDPACS: The EDP Audit, Control, and Security Newsletter  
If you work with sensitive data, you'll find this book indispensable.  ...  First Edition May 1998 ISBN: 1-56592-402-9, 362 pages Java Cryptography teaches you how to write secure programs using Java's cryptographic tools.  ...  It needs to be stored electronically, whether on fixed media (a hard disk), removable media (a floppy disk), or a hardware device (a smart card).  ... 
doi:10.1201/1079/43250.27.4.19991001/30275.5 fatcat:exerh23znrh4rbwwwfwk3nivry

Security in group applications: Lotus Notes as case study [chapter]

Andrew Hutchison
1995 IFIP Advances in Information and Communication Technology  
Group applications provide ways for computer users to work together on common tasks.  ...  I am also grateful to Liba Svobodova, Matthias Kaiserswerth and Kurt Bauknecht for their comments on drafts of this paper.  ...  ACKNOWLEDGEMENTS This work has been informed by Lotus documentation and particularly the on-line "Notes Internals: Security" [5] document.  ... 
doi:10.1007/978-0-387-34873-5_16 fatcat:z2lguhn2bnfrxbem5peaidtzri

Attestation Transparency

Jethro G. Beekman, John L. Manferdelli, David Wagner
2016 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16  
On top of that, we augment Certificate Transparency to distribute information about which services exist and what they do.  ...  This is caused by a lack of guarantees about what is happening on the server side. As a worst case scenario, the service might be subjected to an insider attack.  ...  In order to get the cloud environment closer to the desktop model, these issues need to be resolved. Secure enclaves don't keep any presistent state.  ... 
doi:10.1145/2897845.2897895 dblp:conf/ccs/BeekmanMW16 fatcat:tfcnuuch2ramplztvrn2tglkyu

Market Fragmenting Regulation: Why Gasoline Costs so Much (and Why it's Going to Cost Even More)

Andrew P. Morriss, Nathaniel Stewart
2006 Social Science Research Network  
to hire about 15 lawyers just to argue it won't break any environmental regulations").  ...  In 1920, certainly no more than 100,000 establishments sold gasoline; fully half of them were grocery stores, general stores, and hardware stores.  ...  Likewise, more attention needs to be paid to the rigidity of boutique fuel requirements that prevent blends in one city from being moved to another during a crisis.  ... 
doi:10.2139/ssrn.928503 fatcat:qoqa4kv6srbulfzcdbwuux6tli

Understanding American premium chocolate consumer perception of craft chocolate and desirable product attributes using focus groups and projective mapping

Allison L. Brown, Alyssa J. Bakke, Helene Hopfer, Patrizia Restani
2020 PLoS ONE  
Additionally, they desire credence attributes that convey trust through, for example, the presence or absence of sustainability certifications, or a semblance of meaning.  ...  Weslie Khoo for feedback on the conceptual map and image editing, John Russell, Dr. Heather Froehlich, and Dr. Stéfan Sinclair for their advice with word analysis, and Dr.  ...  I feel like some random-you can find these at [a national discount store] where they have the nice chocolate for some reason.  ... 
doi:10.1371/journal.pone.0240177 pmid:33147215 fatcat:xjggudkbpjhezeomn3bco7zwm4

Building a Secure Organization [chapter]

John Mallery
2013 Computer and Information Security Handbook  
An organization that can demonstrate an infrastructure protected by robust security mechanisms can potentially see a reduction in insurance premiums being paid.  ...  It seems logical that any business, whether a commercial enterprise or a not-for-profit business, would understand that building a secure organization is important to longterm success.  ...  Here is a description of the switch from the program's Help file: Removes data from available unused disk space on the entire volume. If this option is chosen, all other options are ignored.  ... 
doi:10.1016/b978-0-12-394397-2.00001-5 fatcat:mgg3txxmm5h3hopma4vrtubq64

E-Mail Security and Privacy [chapter]

Stewart Miller
1998 Handbook of Enterprise Operations Management  
Learn more about RSA cryptography at the RSA Security Web site (www .rsasecurity.com).  ...  Tip See www.icsalabs.com for more information on ICSA certification.  ...  You simply can't trust other users not to send you infected files. Don't Download Any Files from the Internet For that matter, why download any files from the Internet?  ... 
doi:10.1201/9781420052169.ch48 fatcat:dr2f2bn4tfhkzkinku62hkn74e

Misbehavior in Mobile Application Markets [article]

Steven Meyer
2011 arXiv   pre-print
These markets are growing rapidly with more than 300'000 application in the App Store of Apple and more than 100'000 in the Android Market of Google.  ...  can be installed.  ...  These markets are growing rapidly with more than 300'000 application in the App Store of Apple and more than 100'000 in the Android Market of Google.  ... 
arXiv:1107.1101v1 fatcat:6xpradrervgfdn64urnprpqvkq
« Previous Showing results 1 — 15 out of 1,043 results