Limpar
394 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Artigo Acesso aberto Revisado por pares

Thomas Hedberg, Sylvère Krima, Jaime A. Camelio,

... product data and results in duplicate data. The X.509 standard, maintained by the Telecommunication Standardization Sector of ... X.500 series for electronic directory services, the X.509 framework is used in a wide range of ... from encrypting websites to software-code signing, yet X.509 certificate use has not widely penetrated engineering and ... paper provides a review of the use of X.509 certificates and proposes a solution for embedding X.509 digital certificates in 3D models for authentication, authorization, ...

Tópico(s): Physical Unclonable Functions (PUFs) and Hardware Security

2016 - ASM International | Journal of Computing and Information Science in Engineering

Artigo

Mary R. Thompson, Abdelilah Essiari, Srilekha Mudumbai,

... such as KeyNote, SPKI, and SAML based on X.509 or other key-based identities, none have been ... adopted. As part of an effort to use X.509 identities to provide authorization in highly distributed environments, ... developed and deployed an authorization service based on X.509 identified users and access policy contained in certificates signed by X.509 identified stakeholders. The major goal of this system, ... layer security (TLS) to provide mutual authentication with X.509 certificates. This paper explains the authorization model and ...

Tópico(s): Cloud Data Security Solutions

2003 - Association for Computing Machinery | ACM Transactions on Information and System Security

Capítulo de livro Acesso aberto Revisado por pares

S. Karthikeyan, Rizwan Patan, Balamurugan Balusamy,

... more reliable by making the authentication mechanism from X.509 digital certificates that have a significant impact on IoT security. By using X.509 digital certificates, this authentication mechanism can enhance the ... IoT devices. When IoT devices are integrated with X.509 authentication mechanism, intruders or attackers will not be ...

Tópico(s): Advanced Authentication Protocols Security

2018 - Springer Science+Business Media | Lecture notes in electrical engineering

Artigo Acesso aberto Revisado por pares

Varsharani Hawanna, Vrushali Kulkarni, Rashmi Rane, P. Mestri, S. Panchal,

X.509 certificates enable to affirm the distinguishing proof of the parties involved in the communication. As of now, majority of individuals and communities are using X.509 certificates to demonstrate their ID during on-line ... proposed a framework which assesses risk associated with X.509 Certificates with the help of certain trust criteria ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2016 - Elsevier BV | Procedia Computer Science

Capítulo de livro Acesso aberto Revisado por pares

Dan Kaminsky, Meredith L. Patterson, Len Sassaman,

... somewhat trickier to address than previous attacks against X.509: the applicability of MD2 preimage attacks against the ... certificate for Verisign, and the difficulty of validating X.509 Names contained within PKCS#10 Certificate Requests.We ... first, because Client Authentication is sometimes tied to X.509, and second, because Extended Validation certificates were only ...

Tópico(s): Security and Verification in Computing

2010 - Springer Science+Business Media | Lecture notes in computer science

Artigo Acesso aberto

Warwick Ford,

... recognized standard in this area is ITU-T X.509, first published in 1988. In 1993, the Internet ... Enhanced Mail (PEM) proposals refined the use of X.509. However, more recently it has become apparent that there are several deficiencies in the X.509 formats and in the PEM refinements. Consequently, standards ... have undertaken an expedited activity to revise the X.509 formats by adding extensibility mechanisms and defining a ...

Tópico(s): Access Control and Trust

1995 - Association for Computing Machinery | ACM SIGSAC Review

Artigo Acesso aberto Revisado por pares

Jiaxin Li, Zhaoxin Zhang, Changyong Guo,

X.509 certificates play an important role in encrypting the transmission of data on both sides under HTTPS. With the popularization of X.509 certificates, more and more criminals leverage certificates to ... Phishing sites and malware are good examples. Those X.509 certificates found in phishing sites or malware are called malicious X.509 certificates. This paper applies different machine learning models, ... of capturing essential and crucial characteristics of malicious X.509 certificates.

Tópico(s): Network Security and Intrusion Detection

2021 - Multidisciplinary Digital Publishing Institute | Applied Sciences

Artigo Revisado por pares

Tania Saleem, Muhammad Umar Janjua, Muhammad Hassan, Talha Ahmad, Filza Tariq, Khadija Hafeez, Muhammad Ahsan Salal, Muhammad Danish Bilal,

... solution cooperative with established PKI standards (i.e., X.509) for effective real-world integration. In particular, we ... CAs. Our proposed solution provides all the traditional X.509 PKI operations (i.e., registration, validation, verification, and ...

Tópico(s): Caching and Content Delivery

2022 - Elsevier BV | Computer Networks

Artigo Acesso aberto Revisado por pares

Brian Bockelman, Andrea Ceccanti, Ian Collier, L. Cornwall, Thomas Dack, J. Guenther, M. Lassnig, M. Litmaath, Paul Millar, Mischa Sallé, Hannah Short, Jeny Teheran, Romain Wartel,

... Much has changed since the early 2000s when X.509 certificates presented the most suitable choice for authorisation ... anticipated changes in authorisation model by moving from X.509 to token based authorisation. A concrete example of ...

Tópico(s): Scientific Computing and Data Management

2020 - EDP Sciences | EPJ Web of Conferences

Artigo Revisado por pares

Jesús Asensi Díaz, David Arroyo, Francisco B. Rodrı́guez,

... to the CRL and OCSP procedures of the X.509 infrastructure, and a new protocol for easing the ... our scheme relies on the already widely deployed X.509 infrastructure. On the other hand, the functionality provided ...

Tópico(s): Privacy-Preserving Technologies in Data

2014 - Elsevier BV | Computers & Security

Artigo Acesso aberto

Riccardo Murri, Peter Kunszt, Sergio Maffioletti, Valery Tschopp,

... online certificate signing service, to provide short-lived X.509 certificates and Grid proxies. The main use case ... to provide seamless and secure access to Grid X.509 certificates and proxies in web applications and portals: ... uses the SAML assertion to obtain a Grid X.509 certificate from the SLCS service and generate a ...

Tópico(s): Scientific Computing and Data Management

2011 - Springer Science+Business Media | Journal of Grid Computing

Capítulo de livro Acesso aberto Revisado por pares

Gabriel A. Weaver, Scott A. Rea, Sean W. Smith,

... and SDSI/SPKI or explicitly required as in X.509, document expectations for trust in a PKI. The widespread use of X.509 in the context of global e-Science infrastructures, ... computational tools to process the citation schemes of X.509 certificate policies defined in RFC 2527 and RFC ...

Tópico(s): Service-Oriented Architecture and Web Services

2010 - Springer Science+Business Media | Lecture notes in computer science

Capítulo de livro Acesso aberto Revisado por pares

Marc Stevens, Arjen K. Lenstra, Benne de Weger,

... of our method, we constructed two MD5 based X.509 certificates with identical signatures but different public keys ... Name fields, whereas our previous construction of colliding X.509 certificates required identical name fields. We speculate on ...

Tópico(s): Chaos-based Image/Signal Encryption

2007 - Springer Science+Business Media | Lecture notes in computer science

Artigo

Pino Persiano, Ivan Visconti,

... the use of the SSL/TLS protocol and X.509 certificates. Our main attention is placed on subscription- ... restricting the access to such services by using X.509 certificates and the SSL/TLS protocol, while preserving ... only requires the user to have a standard X.509 certificate (with an RSA key) and does not ...

Tópico(s): Advanced Authentication Protocols Security

2003 - Association for Computing Machinery | ACM Transactions on Information and System Security

Artigo Acesso aberto Revisado por pares

Andrea Ceccanti, Enrico Vianello, Marco Caberletti, F. Giacomini,

X.509 certificates and VOMS have proved to be a secure and reliable solution for authentication and authorization ... experiment computing frameworks. The need to move beyond X.509 certificates is recognized as an important objective in ...

Tópico(s): Access Control and Trust

2019 - EDP Sciences | EPJ Web of Conferences

Artigo Acesso aberto Revisado por pares

Ana Isabel González-Tablas Ferreres, Karel Wouters, Benjamn Ramos Alvarez, Arturo Ribagorda Garnacho,

... the learning enhancement produced by the use of X.509 Public Key Infrastructure (X.509/PKIX)-based digital signatures in a real environment. EVAWEB allows the students to experience main X.509/PKIX processes related to the digital signature mechanism. ...

Tópico(s): Access Control and Trust

2007 - IEEE Education Society | IEEE Transactions on Education

Artigo Acesso aberto Revisado por pares

Diana Berbecaru, Antonio Lioy,

... TLS (Transport Layer Security) communication channels is the X.509 certificate, typically used for authenticating the parties, which ... validated upon use. This paper discusses first the X.509 certificate format and actors influencing the definition, management, ... during revocation checking of EV and non-EV X.509 certificates. For non-EV certificates, the soft-fail ... in 2022. This work bridges the gap between X.509 standards/guidelines and real-world applications' behavior in ...

Tópico(s): Access Control and Trust

2023 - Institute of Electrical and Electronics Engineers | IEEE Access

Artigo Acesso aberto Revisado por pares

Alessandro Barenghi, Nicholas Mainardi, Gerardo Pelosi,

X.509 certificate parsing and validation is a critical task which has shown consistent lack of effectiveness, with ... 10 years. In this work we analyze the X.509 standard and provide a grammar description of it ... We report the results of analyzing a 11M X.509 certificate dump of the HTTPS servers running on ...

Tópico(s): Software Testing and Debugging Techniques

2018 - IOS Press | Journal of Computer Security

Capítulo de livro Revisado por pares

Jesús Asensi Díaz, David Arroyo, Francisco B. Rodrı́guez,

... digital identities the most widely known standard is X.509 Public Key Infrastructure (PKI). Several proposals have been made to extend X.509 certificates to support anonymous signature schemes. However, further ... implement revocation functionalities in such environments. Since in X.509 the procedures for identity revocation mainly rely on ...

Tópico(s): Privacy-Preserving Technologies in Data

2013 - Springer Science+Business Media | Lecture notes in computer science

Artigo Revisado por pares

Mohammad Peyravian, Allen Roginsky, Nevenko Zunic,

The X.509 certification authority-based (CA) public key infrastructure (PKI) is a widely accepted PKI standard which defines data ... certificates that are digitally signed by CAs. However, X.509 requires a huge and expensive infrastructure with complex ... is to present alternative simpler solutions to the X.509 PKI to save storage, bandwidth and to reduce ...

Tópico(s): Advanced Authentication Protocols Security

2004 - Elsevier BV | Computers & Security

Artigo Revisado por pares

Salabat Khan, Fei Luo, Zijian Zhang, Farhan Ullah, Farhan Amin, Syed Furqan Qadri, Md Belal Bin Heyat, Rukhsana Ruby, Lu Wang, Shamsher Ullah, Meng Li, Victor C. M. Leung, Kaishun Wu,

... dependency on online communication in their daily lives. X.509 Public-Key Infrastructure (PKIX) is the most widely ...

Tópico(s): Network Security and Intrusion Detection

2023 - Institute of Electrical and Electronics Engineers | IEEE Communications Surveys & Tutorials

Artigo Acesso aberto Revisado por pares

Maurizio Talamo, Franco Arcieri, Andrea Dimitri, Christian H. Schunck,

... this implementation we retain the full functionality around X.509 certificates, i.e., for the triad (server name, server address, X.509 server certificate), and demonstrate a mechanism for obtaining ...

Tópico(s): Cloud Data Security Solutions

2020 - Multidisciplinary Digital Publishing Institute | Future Internet

Artigo Acesso aberto Revisado por pares

Ahmad Samer Wazan, Romain Laborde, David Chadwick, Rémi Venant, Abdelmalek Benzekri, Eddie Billoir, Omar Alfandi,

... and integrity of data. It is based on X.509 Certificates. Our previous research showed that popular Web ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2020 - IEEE Computer Society | IEEE Transactions on Dependable and Secure Computing

Artigo Revisado por pares

Martin Peterek, Benjamin Montavon,

... standardized IoT protocols, a fully implemented approach using X.509 to represent instrument calibration and cryptographically sign measurements ...

Tópico(s): Industrial Vision Systems and Defect Detection

2020 - Elsevier BV | CIRP Annals

Artigo Revisado por pares

Ze Wang, Jingqiang Lin, Quanwei Cai, Qiongxiao Wang, Daren Zha, Jiwu Jing,

Traditional X.509 public key infrastructures (PKIs) depend on trusted certification authorities (CAs) to sign certificates, used in SSL/TLS ... authority of CAs. Our scheme is compatible with X.509 PKIs but significantly reinforces the security guarantees of ...

Tópico(s): Privacy-Preserving Technologies in Data

2020 - IEEE Computer Society | IEEE Transactions on Dependable and Secure Computing

Artigo Revisado por pares

HyukSang Kwon, Jeongseob Ahn, JeongGil Ko,

... cause of this being the size of the X.509‐based Internet certificates. Typically being 1 to 2 ... security certificates using the similarity of contents in X.509 certificates. Specifically, LightCert identifies common fields in a ...

Tópico(s): Security in Wireless Sensor Networks

2019 - | Transactions on Emerging Telecommunications Technologies

Artigo Acesso aberto Revisado por pares

Joel Höglund, Samuel Tanner Lindemer, Martin Furuhed, Shahid Raza,

... devices. We also design a lightweight profile for X.509 digital certificates with CBOR encoding, called XIOT. Existing CAs can now issue traditional X.509 to IoT devices. These are converted to and ...

Tópico(s): Security in Wireless Sensor Networks

2019 - Elsevier BV | Computers & Security

Artigo Acesso aberto

Nina Bindel, Johannes Braun, Luca Gladiator, Tobias Stöckert, Johannes Wirth,

We provide an X.509-standard-compliant Java implementation of hybrid certificates, which enable the parallel usage of two independent cryptographic schemes within public ...

Tópico(s): Distributed and Parallel Computing Systems

2019 - Open Journals | The Journal of Open Source Software

Capítulo de livro Revisado por pares

Ze Wang, Jingqiang Lin, Quanwei Cai, Qiongxiao Wang, Jiwu Jing, Daren Zha,

Traditional X.509 public key infrastructures (PKIs) depend on certification authorities (CAs) to sign certificates, used in SSL/TLS to ... and revocation transparency. Our scheme is compatible with X.509 PKIs but significantly reinforces the security guarantees of ...

Tópico(s): Cryptography and Data Security

2019 - Springer Science+Business Media | Lecture notes in computer science