Certification with multiple signatures
RIIT 2015 - Proceedings of the 4th Annual ACM Conference on Research in Information Technology, Page: 13-18
2015
- 7Citations
- 1Usage
- 10Captures
Metric Options: CountsSelecting the 1-year or 3-year option will change the metrics count to percentiles, illustrating how an article or review compares to other articles or reviews within the selected time period in the same journal. Selecting the 1-year option compares the metrics against other articles/reviews that were also published in the same calendar year. Selecting the 3-year option compares the metrics against other articles/reviews that were also published in the same calendar year plus the two years prior.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Metrics Details
- Citations7
- Citation Indexes7
- CrossRef4
- Usage1
- Abstract Views1
- Captures10
- Readers10
- 10
Conference Paper Description
Certificate Authority (CA) is a single point of failure in the design of Public Key Infrastructure (PKI). A single compromised CA breaks the entire infrastructure. The disclosed CA key can be used by adversaries to issue rogue certifi- cates for any domains without the consent of the domain owners. These rogue certificates have been used in Man-inthe- Middle (MitM) attacks. Studies have been conducted to prevent and reduce the damages of breached CAs and rogue certificates in diferent ways. However, few have a mechanism to fully and eficiently verify whether a CA or a certificate can be trusted or not. There is a need to develop new methods to ensure certificates with a high level of trustworthy in order for the PKI to be more resistant to compromised CAs and rogue certificates. We propose an alternative approach to mitigate the issue of CA breaches by imposing multiple signatures on a server certificate. This is analogous with the redundancy approach that is commonly adopted in the practice of IT management. Since CAs are run and managed by independent organizations, the probability of breaking multiple CAs in a short period of time is reduced significantly. If S signatures are imposed on a certificate, the compromise of S - 1 CAs will not break the PKI system. In this paper, we describe a framework of our approach and analyze its security. We also provide a brief overview of the most relevant counter measures against CA breaches and rogue certificates.
Bibliographic Details
http://www.scopus.com/inward/record.url?partnerID=HzOxMe3b&scp=85019207969&origin=inward; http://dx.doi.org/10.1145/2808062.2808068; https://dl.acm.org/doi/10.1145/2808062.2808068; https://digitalcommons.mtu.edu/michigantech-p/12560; https://digitalcommons.mtu.edu/cgi/viewcontent.cgi?article=31862&context=michigantech-p
Association for Computing Machinery (ACM)
Provide Feedback
Have ideas for a new metric? Would you like to see something else here?Let us know