Thomas Hedberg, Sylvère Krima, Jaime A. Camelio,
... product data and results in duplicate data. The X.509 standard, maintained by the Telecommunication Standardization Sector of ... X.500 series for electronic directory services, the X.509 framework is used in a wide range of ... from encrypting websites to software-code signing, yet X.509 certificate use has not widely penetrated engineering and ... paper provides a review of the use of X.509 certificates and proposes a solution for embedding X.509 digital certificates in 3D models for authentication, authorization, ...
Tópico(s): Physical Unclonable Functions (PUFs) and Hardware Security
2016 - ASM International | Journal of Computing and Information Science in Engineering
Mary R. Thompson, Abdelilah Essiari, Srilekha Mudumbai,
... such as KeyNote, SPKI, and SAML based on X.509 or other key-based identities, none have been ... adopted. As part of an effort to use X.509 identities to provide authorization in highly distributed environments, ... developed and deployed an authorization service based on X.509 identified users and access policy contained in certificates signed by X.509 identified stakeholders. The major goal of this system, ... layer security (TLS) to provide mutual authentication with X.509 certificates. This paper explains the authorization model and ...
Tópico(s): Cloud Data Security Solutions
2003 - Association for Computing Machinery | ACM Transactions on Information and System Security
S. Karthikeyan, Rizwan Patan, Balamurugan Balusamy,
... more reliable by making the authentication mechanism from X.509 digital certificates that have a significant impact on IoT security. By using X.509 digital certificates, this authentication mechanism can enhance the ... IoT devices. When IoT devices are integrated with X.509 authentication mechanism, intruders or attackers will not be ...
Tópico(s): Advanced Authentication Protocols Security
2018 - Springer Science+Business Media | Lecture notes in electrical engineering
Varsharani Hawanna, Vrushali Kulkarni, Rashmi Rane, P. Mestri, S. Panchal,
X.509 certificates enable to affirm the distinguishing proof of the parties involved in the communication. As of now, majority of individuals and communities are using X.509 certificates to demonstrate their ID during on-line ... proposed a framework which assesses risk associated with X.509 Certificates with the help of certain trust criteria ...
Tópico(s): Internet Traffic Analysis and Secure E-voting
2016 - Elsevier BV | Procedia Computer Science
Dan Kaminsky, Meredith L. Patterson, Len Sassaman,
... somewhat trickier to address than previous attacks against X.509: the applicability of MD2 preimage attacks against the ... certificate for Verisign, and the difficulty of validating X.509 Names contained within PKCS#10 Certificate Requests.We ... first, because Client Authentication is sometimes tied to X.509, and second, because Extended Validation certificates were only ...
Tópico(s): Security and Verification in Computing
2010 - Springer Science+Business Media | Lecture notes in computer science
... recognized standard in this area is ITU-T X.509, first published in 1988. In 1993, the Internet ... Enhanced Mail (PEM) proposals refined the use of X.509. However, more recently it has become apparent that there are several deficiencies in the X.509 formats and in the PEM refinements. Consequently, standards ... have undertaken an expedited activity to revise the X.509 formats by adding extensibility mechanisms and defining a ...
Tópico(s): Access Control and Trust
1995 - Association for Computing Machinery | ACM SIGSAC Review
Jiaxin Li, Zhaoxin Zhang, Changyong Guo,
X.509 certificates play an important role in encrypting the transmission of data on both sides under HTTPS. With the popularization of X.509 certificates, more and more criminals leverage certificates to ... Phishing sites and malware are good examples. Those X.509 certificates found in phishing sites or malware are called malicious X.509 certificates. This paper applies different machine learning models, ... of capturing essential and crucial characteristics of malicious X.509 certificates.
Tópico(s): Network Security and Intrusion Detection
2021 - Multidisciplinary Digital Publishing Institute | Applied Sciences
Tania Saleem, Muhammad Umar Janjua, Muhammad Hassan, Talha Ahmad, Filza Tariq, Khadija Hafeez, Muhammad Ahsan Salal, Muhammad Danish Bilal,
... solution cooperative with established PKI standards (i.e., X.509) for effective real-world integration. In particular, we ... CAs. Our proposed solution provides all the traditional X.509 PKI operations (i.e., registration, validation, verification, and ...
Tópico(s): Caching and Content Delivery
2022 - Elsevier BV | Computer Networks
Brian Bockelman, Andrea Ceccanti, Ian Collier, L. Cornwall, Thomas Dack, J. Guenther, M. Lassnig, M. Litmaath, Paul Millar, Mischa Sallé, Hannah Short, Jeny Teheran, Romain Wartel,
... Much has changed since the early 2000s when X.509 certificates presented the most suitable choice for authorisation ... anticipated changes in authorisation model by moving from X.509 to token based authorisation. A concrete example of ...
Tópico(s): Scientific Computing and Data Management
2020 - EDP Sciences | EPJ Web of Conferences
Ahmad Samer Wazan, Romain Laborde, David Chadwick, François Barrère, Abdelmalek Benzekri, Mustafa Kaiiali, Adib Habbal,
... on a trust model defined by the original X.509 (1988) standard and is composed of three entities: ... whole. In response, the latest draft edition of X.509 has proposed a new trust model by adding ...
Tópico(s): Internet Traffic Analysis and Secure E-voting
2017 - Hindawi Publishing Corporation | Security and Communication Networks
Jesús Asensi Díaz, David Arroyo, Francisco B. Rodrı́guez,
... to the CRL and OCSP procedures of the X.509 infrastructure, and a new protocol for easing the ... our scheme relies on the already widely deployed X.509 infrastructure. On the other hand, the functionality provided ...
Tópico(s): Privacy-Preserving Technologies in Data
2014 - Elsevier BV | Computers & Security
Riccardo Murri, Peter Kunszt, Sergio Maffioletti, Valery Tschopp,
... online certificate signing service, to provide short-lived X.509 certificates and Grid proxies. The main use case ... to provide seamless and secure access to Grid X.509 certificates and proxies in web applications and portals: ... uses the SAML assertion to obtain a Grid X.509 certificate from the SLCS service and generate a ...
Tópico(s): Scientific Computing and Data Management
2011 - Springer Science+Business Media | Journal of Grid Computing
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith,
... and SDSI/SPKI or explicitly required as in X.509, document expectations for trust in a PKI. The widespread use of X.509 in the context of global e-Science infrastructures, ... computational tools to process the citation schemes of X.509 certificate policies defined in RFC 2527 and RFC ...
Tópico(s): Service-Oriented Architecture and Web Services
2010 - Springer Science+Business Media | Lecture notes in computer science
Marc Stevens, Arjen K. Lenstra, Benne de Weger,
... of our method, we constructed two MD5 based X.509 certificates with identical signatures but different public keys ... Name fields, whereas our previous construction of colliding X.509 certificates required identical name fields. We speculate on ...
Tópico(s): Chaos-based Image/Signal Encryption
2007 - Springer Science+Business Media | Lecture notes in computer science
... the use of the SSL/TLS protocol and X.509 certificates. Our main attention is placed on subscription- ... restricting the access to such services by using X.509 certificates and the SSL/TLS protocol, while preserving ... only requires the user to have a standard X.509 certificate (with an RSA key) and does not ...
Tópico(s): Advanced Authentication Protocols Security
2003 - Association for Computing Machinery | ACM Transactions on Information and System Security
Andrea Ceccanti, Enrico Vianello, Marco Caberletti, F. Giacomini,
X.509 certificates and VOMS have proved to be a secure and reliable solution for authentication and authorization ... experiment computing frameworks. The need to move beyond X.509 certificates is recognized as an important objective in ...
Tópico(s): Access Control and Trust
2019 - EDP Sciences | EPJ Web of Conferences
Ana Isabel González-Tablas Ferreres, Karel Wouters, Benjamn Ramos Alvarez, Arturo Ribagorda Garnacho,
... the learning enhancement produced by the use of X.509 Public Key Infrastructure (X.509/PKIX)-based digital signatures in a real environment. EVAWEB allows the students to experience main X.509/PKIX processes related to the digital signature mechanism. ...
Tópico(s): Access Control and Trust
2007 - IEEE Education Society | IEEE Transactions on Education
Diana Berbecaru, Antonio Lioy,
... TLS (Transport Layer Security) communication channels is the X.509 certificate, typically used for authenticating the parties, which ... validated upon use. This paper discusses first the X.509 certificate format and actors influencing the definition, management, ... during revocation checking of EV and non-EV X.509 certificates. For non-EV certificates, the soft-fail ... in 2022. This work bridges the gap between X.509 standards/guidelines and real-world applications' behavior in ...
Tópico(s): Access Control and Trust
2023 - Institute of Electrical and Electronics Engineers | IEEE Access
Alessandro Barenghi, Nicholas Mainardi, Gerardo Pelosi,
X.509 certificate parsing and validation is a critical task which has shown consistent lack of effectiveness, with ... 10 years. In this work we analyze the X.509 standard and provide a grammar description of it ... We report the results of analyzing a 11M X.509 certificate dump of the HTTPS servers running on ...
Tópico(s): Software Testing and Debugging Techniques
2018 - IOS Press | Journal of Computer Security
Jesús Asensi Díaz, David Arroyo, Francisco B. Rodrı́guez,
... digital identities the most widely known standard is X.509 Public Key Infrastructure (PKI). Several proposals have been made to extend X.509 certificates to support anonymous signature schemes. However, further ... implement revocation functionalities in such environments. Since in X.509 the procedures for identity revocation mainly rely on ...
Tópico(s): Privacy-Preserving Technologies in Data
2013 - Springer Science+Business Media | Lecture notes in computer science
Mohammad Peyravian, Allen Roginsky, Nevenko Zunic,
The X.509 certification authority-based (CA) public key infrastructure (PKI) is a widely accepted PKI standard which defines data ... certificates that are digitally signed by CAs. However, X.509 requires a huge and expensive infrastructure with complex ... is to present alternative simpler solutions to the X.509 PKI to save storage, bandwidth and to reduce ...
Tópico(s): Advanced Authentication Protocols Security
2004 - Elsevier BV | Computers & Security
Salabat Khan, Fei Luo, Zijian Zhang, Farhan Ullah, Farhan Amin, Syed Furqan Qadri, Md Belal Bin Heyat, Rukhsana Ruby, Lu Wang, Shamsher Ullah, Meng Li, Victor C. M. Leung, Kaishun Wu,
... dependency on online communication in their daily lives. X.509 Public-Key Infrastructure (PKIX) is the most widely ...
Tópico(s): Network Security and Intrusion Detection
2023 - Institute of Electrical and Electronics Engineers | IEEE Communications Surveys & Tutorials
Maurizio Talamo, Franco Arcieri, Andrea Dimitri, Christian H. Schunck,
... this implementation we retain the full functionality around X.509 certificates, i.e., for the triad (server name, server address, X.509 server certificate), and demonstrate a mechanism for obtaining ...
Tópico(s): Cloud Data Security Solutions
2020 - Multidisciplinary Digital Publishing Institute | Future Internet
Ahmad Samer Wazan, Romain Laborde, David Chadwick, Rémi Venant, Abdelmalek Benzekri, Eddie Billoir, Omar Alfandi,
... and integrity of data. It is based on X.509 Certificates. Our previous research showed that popular Web ...
Tópico(s): Internet Traffic Analysis and Secure E-voting
2020 - IEEE Computer Society | IEEE Transactions on Dependable and Secure Computing
Martin Peterek, Benjamin Montavon,
... standardized IoT protocols, a fully implemented approach using X.509 to represent instrument calibration and cryptographically sign measurements ...
Tópico(s): Industrial Vision Systems and Defect Detection
2020 - Elsevier BV | CIRP Annals
Ze Wang, Jingqiang Lin, Quanwei Cai, Qiongxiao Wang, Daren Zha, Jiwu Jing,
Traditional X.509 public key infrastructures (PKIs) depend on trusted certification authorities (CAs) to sign certificates, used in SSL/TLS ... authority of CAs. Our scheme is compatible with X.509 PKIs but significantly reinforces the security guarantees of ...
Tópico(s): Privacy-Preserving Technologies in Data
2020 - IEEE Computer Society | IEEE Transactions on Dependable and Secure Computing
HyukSang Kwon, Jeongseob Ahn, JeongGil Ko,
... cause of this being the size of the X.509‐based Internet certificates. Typically being 1 to 2 ... security certificates using the similarity of contents in X.509 certificates. Specifically, LightCert identifies common fields in a ...
Tópico(s): Security in Wireless Sensor Networks
2019 - | Transactions on Emerging Telecommunications Technologies
Joel Höglund, Samuel Tanner Lindemer, Martin Furuhed, Shahid Raza,
... devices. We also design a lightweight profile for X.509 digital certificates with CBOR encoding, called XIOT. Existing CAs can now issue traditional X.509 to IoT devices. These are converted to and ...
Tópico(s): Security in Wireless Sensor Networks
2019 - Elsevier BV | Computers & Security
Nina Bindel, Johannes Braun, Luca Gladiator, Tobias Stöckert, Johannes Wirth,
We provide an X.509-standard-compliant Java implementation of hybrid certificates, which enable the parallel usage of two independent cryptographic schemes within public ...
Tópico(s): Distributed and Parallel Computing Systems
2019 - Open Journals | The Journal of Open Source Software
Ze Wang, Jingqiang Lin, Quanwei Cai, Qiongxiao Wang, Jiwu Jing, Daren Zha,
Traditional X.509 public key infrastructures (PKIs) depend on certification authorities (CAs) to sign certificates, used in SSL/TLS to ... and revocation transparency. Our scheme is compatible with X.509 PKIs but significantly reinforces the security guarantees of ...
Tópico(s): Cryptography and Data Security
2019 - Springer Science+Business Media | Lecture notes in computer science