233 research outputs found

    Internet Key Exchange Protocol Version 2 (IKEv2)

    Full text link

    Blockchain-Enabled DPKI Framework

    Get PDF
    Public Key Infrastructures (PKIs), which rely on digital signature technology and establishment of trust and security association parameters between entities, allow entities to interoperate with authentication proofs, using standardized digital certificates (with X.509v3 as the current reference). Despite PKI technology being used by many applications for their security foundations (e.g. WEB/HTTPS/TLS, Cloud-Enabled Services, LANs/WLANs Security, VPNs, IP-Security), there are several concerns regarding their inherent design assumptions based on a centralized trust model. To avoid some problems and drawbacks that emerged from the centralization assumptions, a Decentralized Public Key Infrastructure (DPKI), is an alternative approach. The main idea for DPKIs is the ability to establish trust relations between all parties, in a web-of-trust model, avoiding centralized authorities and related root-of-trust certificates. As a possible solution for DPKI frameworks, the Blockchain technology, as an enabler solution, can help overcome some of the identified PKI problems and security drawbacks. Blockchain-enabled DPKIs can be designed to address a fully decentralized ledger for managed certificates, providing data-replication with strong consistency guarantees, and fairly distributed trust management properties founded on a P2P trust model. In this approach, typical PKI functions are supported cooperatively, with validity agreement based on consistency criteria, for issuing, verification and revocation of X509v3 certificates. It is also possible to address mechanisms to provide rapid reaction of principals in the verification of traceable, shared and immutable history logs of state-changes related to the life-cycle of certificates, with certificate validation rules established consistently by programmable Smart Contracts executed by peers. In this dissertation we designed, implemented and evaluated a Blockchain-Enabled Decentralized Public Key Infrastructure (DPKI) framework, providing an implementation prototype solution that can be used and to support experimental research. The proposal is based on a framework instantiating a permissioned collaborative consortium model, using the service planes supported in an extended Blockchain platform leveraged by the Hyperledger Fabric (HLF) solution. In our proposed DPKI framework model, X509v3 certificates are issued and managed following security invariants, processing rules, managing trust assumptions and establishing consistency metrics, defined and executed in a decentralized way by the Blockchain nodes, using Smart Contracts. Certificates are issued cooperatively and can be issued with group-oriented threshold-based Byzantine fault-tolerant (BFT) signatures, as group-oriented authentication proofs. The Smart Contracts dictate how Blockchain peers participate consistently in issuing, signing, attestation, validation and revocation processes. Any peer can validate certificates obtaining their consistent states consolidated in closed blocks in a Meckle tree structure maintained in the Blockchain. State-transition operations are managed with serializability guarantees, provided by Byzantine Fault Tolerant (BFT) consensus primitives

    The Impact of DNSSEC on the Internet Landscape

    Get PDF
    In this dissertation we investigate the security deficiencies of the Domain Name System (DNS) and assess the impact of the DNSSEC security extensions. DNS spoofing attacks divert an application to the wrong server, but are also used routinely for blocking access to websites. We provide evidence for systematic DNS spoofing in China and Iran with measurement-based analyses, which allow us to examine the DNS spoofing filters from vantage points outside of the affected networks. Third-parties in other countries can be affected inadvertently by spoofing-based domain filtering, which could be averted with DNSSEC. The security goals of DNSSEC are data integrity and authenticity. A point solution called NSEC3 adds a privacy assertion to DNSSEC, which is supposed to prevent disclosure of the domain namespace as a whole. We present GPU-based attacks on the NSEC3 privacy assertion, which allow efficient recovery of the namespace contents. We demonstrate with active measurements that DNSSEC has found wide adoption after initial hesitation. At server-side, there are more than five million domains signed with DNSSEC. A portion of them is insecure due to insufficient cryptographic key lengths or broken due to maintenance failures. At client-side, we have observed a worldwide increase of DNSSEC validation over the last three years, though not necessarily on the last mile. Deployment of DNSSEC validation on end hosts is impaired by intermediate caching components, which degrade the availability of DNSSEC. However, intermediate caches contribute to the performance and scalability of the Domain Name System, as we show with trace-driven simulations. We suggest that validating end hosts utilize intermediate caches by default but fall back to autonomous name resolution in case of DNSSEC failures.In dieser Dissertation werden die Sicherheitsdefizite des Domain Name Systems (DNS) untersucht und die Auswirkungen der DNSSEC-Sicherheitserweiterungen bewertet. DNS-Spoofing hat den Zweck eine Anwendung zum falschen Server umzuleiten, wird aber auch regelmĂ€ĂŸig eingesetzt, um den Zugang zu Websites zu sperren. Durch messbasierte Analysen wird in dieser Arbeit die systematische DurchfĂŒhrung von DNS-Spoofing-Angriffen in China und im Iran belegt, wobei sich die Messpunkte außerhalb der von den Sperrfiltern betroffenen Netzwerke befinden. Es wird gezeigt, dass Dritte in anderen LĂ€ndern durch die Spoofing-basierten Sperrfilter unbeabsichtigt beeintrĂ€chtigt werden können, was mit DNSSEC verhindert werden kann. Die Sicherheitsziele von DNSSEC sind DatenintegritĂ€t und AuthentizitĂ€t. Die NSEC3-Erweiterung sichert zudem die Privatheit des Domainnamensraums, damit die Inhalte eines DNSSEC-Servers nicht in GĂ€nze ausgelesen werden können. In dieser Arbeit werden GPU-basierte Angriffsmethoden auf die von NSEC3 zugesicherte Privatheit vorgestellt, die eine effiziente Wiederherstellung des Domainnamensraums ermöglichen. Ferner wird mit aktiven Messmethoden die Verbreitung von DNSSEC untersucht, die nach anfĂ€nglicher ZurĂŒckhaltung deutlich zugenommen hat. Auf der Serverseite gibt es mehr als fĂŒnf Millionen mit DNSSEC signierte Domainnamen. Ein Teil davon ist aufgrund von unzureichenden kryptographischen SchlĂŒssellĂ€ngen unsicher, ein weiterer Teil zudem aufgrund von Wartungsfehlern nicht mit DNSSEC erreichbar. Auf der Clientseite ist der Anteil der DNSSEC-Validierung in den letzten drei Jahren weltweit gestiegen. Allerdings ist hierbei offen, ob die Validierung nahe bei den EndgerĂ€ten stattfindet, um unvertraute Kommunikationspfade vollstĂ€ndig abzusichern. Der Einsatz von DNSSEC-Validierung auf EndgerĂ€ten wird durch zwischengeschaltete DNS-Cache-Komponenten erschwert, da hierdurch die VerfĂŒgbarkeit von DNSSEC beeintrĂ€chtigt wird. Allerdings tragen zwischengeschaltete Caches zur Performance und Skalierbarkeit des Domain Name Systems bei, wie in dieser Arbeit mit messbasierten Simulationen gezeigt wird. Daher sollten EndgerĂ€te standardmĂ€ĂŸig die vorhandene DNS-Infrastruktur nutzen, bei Validierungsfehlern jedoch selbstĂ€ndig die DNSSEC-Zielserver anfragen, um im Cache gespeicherte, fehlerhafte DNS-Antworten zu umgehen

    Multilingual interactive integrated multimedia based e-commerce

    Get PDF
    As we approach the end of the twentieth century, E-commerce is a critical force shaping the world of today and tomorrow. E-commerce have introduced a new society where people can buy freely, anywhere, at anytime, across the globe on the web. There seems to be a market for consultants and outsourcing purveyors who will take your money and put together an online business for you. These are all very different markets, however. As lot of people speak different language than English, the concept of Multilingual Technology is essential. The primary purpose of this research paper is to study the Integrated Multimedia interaction with today\u27s technology secondary purpose is to check out the Application of this technology in E -Commerce with the help of Multilingual technology. Multilingual-based E-commerce would prompt more widespread use of the types of services now available and prompt the development of new and better services and the benefits brought by information, technology, and information services available will be magnified and extended globally

    Trust on the semantic web

    Get PDF
    The Semantic Web is a vision to create a “web of knowledge”; an extension of the Web as we know it which will create an information space which will be usable by machines in very rich ways. The technologies which make up the Semantic Web allow machines to reason across information gathered from the Web, presenting only relevant results and inferences to the user. Users of the Web in its current form assess the credibility of the information they gather in a number of different ways. If processing happens without the user being able to check the source and credibility of each piece of information used in the processing, the user must be able to trust that the machine has used trustworthy information at each step of the processing. The machine should therefore be able to automatically assess the credibility of each piece of information it gathers from the Web. A case study on advanced checks for website credibility is presented, and the site presented in the case presented is found to be credible, despite failing many of the checks which are presented. A website with a backend based on RDF technologies is constructed. A better understanding of RDF technologies and good knowledge of the RAP and Redland RDF application frameworks is gained. The second aim of constructing the website was to gather information to be used for testing various trust metrics. The website did not gain widespread support, and therefore not enough data was gathered for this. Techniques for presenting RDF data to users were also developed during website development, and these are discussed. Experiences in gathering RDF data are presented next. A scutter was successfully developed, and the data smushed to create a database where uniquely identifiable objects were linked, even where gathered from different sources. Finally, the use of digital signature as a means of linking an author and content produced by that author is presented. RDF/XML canonicalisation is discussed in the provision of ideal cryptographic checking of RDF graphs, rather than simply checking at the document level. The notion of canonicalisation on the semantic, structural and syntactic levels is proposed. A combination of an existing canonicalisation algorithm and a restricted RDF/XML dialect is presented as a solution to the RDF/XML canonicalisation problem. We conclude that a trusted Semantic Web is possible, with buy in from publishing and consuming parties

    Diameter Base Protocol

    Full text link

    Internatsionaliseerumise protsessid Hiina firmades: teadmuse roll

    Get PDF
    VĂ€itekirja elektrooniline versioon ei sisalda empiirilisi uuringuid.Kasutades nii kvantitatiivseid kui ka kvalitatiivseid meetodeid ĂŒhendades vĂ”rdlevaid uuringuid ja pikaajalisi analĂŒĂŒse, on doktoritöö eesmĂ€rgiks vĂ€lja selgitada teadmuse roll Hiina ettevĂ”tete internatsionaliseerumise protsessides. Töös töödeldakse sĂŒstemaatiliselt, Hiina kontekstist lĂ€htuvalt, rahvusvahelistumise uuringuid, otse allikast saadud ettevĂ”ttetasandil olevaid andmeid ning viie originaal vĂ€ljaande tulemusi, mis on ĂŒhendatud vastavalt teenima sama eemĂ€rki, ent neil on eri teadusuuringulised eesmĂ€rgid, mis keskenduvad erinevatele aspektidele, kasutades erinevaid meetodeid. Doktoritöö teoreetiline osa pĂ”hineb rahvusvahelistumise teemalisel kirjandusel, eriti Uppsala mudelil ja Born Global mudelil. Samuti keskendub töö kirjandus ettevĂ”tete vĂ€lismaiste kogemuslikule teadmusele ja selle omandamisele. Autor leiab, et vĂ€listuru teadmus on oluline ettevĂ”tete rahvusvahelistumise seisukohast. Selle puudumise korral vĂ”ib aeglustuda rahvusvahelistumise protsess ja pĂ”hjustada ettevĂ”tete esialgset sisenemist lĂ€hiriikidesse, kasutades selleks kĂ”ige lihtsamaid sisenemise mudeleid. EttevĂ”tted vĂ”ivad omandada vĂ€listurule sisenemise teadmisi, mitte ĂŒksnes otsesest turukogemusest, vaid ka palgates teatud liiki uut personali, tehes koostööd jne. VĂ€listuru tundmine vĂ”ib positiivselt mĂ”jutada ettevĂ”tete rahvusvahelistumise protsessi, kuid ei pruugi tagada edu. EttevĂ”tete rahvusvaheliseerumine ei pruugi olla sujuv, vaid pigem lainekujuline protsess, mis hĂ”lmab endas oodatud ja radikaalseid muututusi. Kasutades esmaallikatasandist pĂ€rinevaid ettevĂ”tte andmeid ning analĂŒĂŒsides neid kombineeritud meetodite abil, selgus, et nii Hiina BG ja NBG ettevĂ”tted rahvusvahelistusid esilagu edukalt, vaatamata puuduvale teadmusele. Madal teadmuse tase ei mĂ”juta nende rahvusvahelistumise kiirust, kuid kĂ”ik ettevĂ”tted kasutasid eksportimist kui vĂ€lismaist tööreĆŸiimi. MĂ”lemad BG-d ja NBG-d valivad kultuuriliselt ja geograafiliselt kaugemad riigid, mis on suurema elanikkonna ja arenenuma majandusega. PĂ€rast sisenemist oma kolme esimesele vĂ€listurule, ettevĂ”tted hakkavad omandama teadmisi, mis hakkavad mĂ”jutama nende edasisi vĂ€listurgudele laienemise strateegiaid. Muutuste ja kriisiperioodil mÀÀrab teadmuse tase, kas ettevĂ”tted lahkuvad vĂ€listurgudelt ning kui edukas on nende taassisenemine vĂ€listurule.teadmisedettevĂ”ttedrahvusvahelistuminekvantitatiivsed uurimismeetodidkvalitatiivsed uurimismeetodidvĂ”rdlevuuringudHiinaUsing both quantitative and qualitative methods, and combining comparative studies and longitudinal analysis, the aim of this dissertation is to identify the role of knowledge in internationalization processes of Chinese firms. By systematically reviewing the literature on internationalization studies in the Chinese context, and by using firsthand firm-level data, five original publications result, which are united under the same goal yet have separate research tasks that focus on different aspects using various methodologies.The theoretical part of this thesis is based on the internationalization literature, particular on streams of Uppsala model and Born global model. It also focuses on the literature regarding firms’ foreign experiential knowledge and its acquisition. Author concludes that foreign market knowledge is important to firms’ internationalization. A lack of it may slow down the internationalization process and cause firms to initially enter the closest countries, using the simplest entry modes. Firms may acquire foreign market knowledge not only through direct market experience, but also by hiring certain types of personnel, cooperation, and so on. Foreign market knowledge may positively affect firms’ internationalization processes, but does not guarantee success. Firms’ internationalization is not necessarily a smooth path, but rather a wave- shaped process that involves expected and radical changes.Through the mixed-methods, by using first-hand firm level data, this research discovers that both Chinese BGs and NBGs initially internationalize successfully, despite lacking knowledge. Low knowledge levels do not affect their internationalization speed, but firms all use exporting as their foreign operation mode. Both BGs and NBGs select culturally and geographically more distant countries that have a higher population and more advanced economic development. After entering their first three foreign markets, firms start to gain knowledge, which affects their foreign expansion strategy going forward. During periods of radical change and crisis, knowledge level determines decisions relating to the firms’ foreign market exit, and the success of reentry.knowledgefirmsinternationalisationquantitative research methodsqualitative research methodscomparative researchChin

    DSpace 1.8 manual

    Get PDF
    • 

    corecore