【24h】

Security Vulnerabilities in the Trust-List PKI

机译:信托列表PKI中的安全漏洞

获取原文

摘要

The trust-list public key infrastructure (TLPKI) and the current implementation by the clients (such as Web browsers), the servers (such as Web servers) and the Root Certification Authorities, is one of the most widely deployed type of PKI. Each client is distributed with a preconfigured set of self-signed root certificates (SSRCs) that enable the end-user to use secure services such as secure network connections, secure e-mail and execution of signed software. However, at present, the policies and procedures for the inclusion of SSRCs can be a source of security vulnerabilities. This paper identifies and analyses these security vulnerabilities and in order to tackle them, the Certificate Use Accounting mechanism is proposed.
机译:信任列表公钥基础架构(TLPKI)和客户端(如Web浏览器)的当前实现(如Web浏览器),服务器(如Web服务器)和根证书颁发机构是最广泛部署类型的PKI之一。每个客户端都以预先配置的自签名根证书(SSRC)分发,使最终用户能够使用安全的服务,例如安全的网络连接,安全电子邮件和签名软件的执行。但是,目前,包含SSRC的政策和程序可以是安全漏洞的来源。本文识别并分析了这些安全漏洞,并提出了证书使用会计机制。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号