3,539 research outputs found

    PKI Interoperability: Still an Issue? A Solution in the X. 509 Realm

    Get PDF
    There exist many obstacles that slow the global adoption of public key infrastructure (PKI) technology. The PKI interoperability problem, being poorly understood, is one of the most confusing. In this paper, we clarify the PKI interoperability issue by exploring both the juridical and technical domains. We demonstrate the origin of the PKI interoperability problem by determining its root causes, the latter being legal, organizational and technical differences between countries, which mean that relying parties have no one to rely on. We explain how difficult it is to harmonize them. Finally, we propose to handle the interoperability problem from the trust management point of view, by introducing the role of a trust broker which is in charge of helping relying parties make informed decisions about X.509 certificates

    Using security patterns for modelling security capabilities in a Grid OS

    Get PDF

    Legal Implications of E-Commerce: Basic Issues, Initiatives and Experiences in Asia

    Get PDF
    This paper gives a short overview on the major issues that have to be taken into account when formulating e-commerce-related laws and regulations and introduces two model laws relating to e-commerce and e-signatures which were created by the United Nations Commission of International trade Law. The paper has a closer look at e-commerce developments in Asia and the Pacific and gives an overview of the state of implementation of e-commerce laws. In conclusion, it discusses the e-ASEAN Reference Framework for electronic commerce legal infrastructure as example of a regional initiative to harmonize the legal basis for e-commerce.legal infrastructure, e-commerce laws, Asia, e-signature, e-ASEAN Reference Framework

    Secure Position-Based Routing for VANETs

    Get PDF
    Vehicular communication (VC) systems have the potential to improve road safety and driving comfort. Nevertheless, securing the operation is a prerequisite for deployment. So far, the security of VC applications has mostly drawn the attention of research efforts, while comprehensive solutions to protect the network operation have not been developed. In this paper, we address this problem: we provide a scheme that secures geographic position-based routing, which has been widely accepted as the appropriate one for VC. Moreover, we focus on the scheme currently chosen and evaluated in the Car2Car Communication Consortium (C2C-CC). We integrate security mechanisms to protect the position-based routing functionality and services (beaconing, multi-hop forwarding, and geo-location discovery), and enhance the network robustness. We propose defense mechanisms, relying both on cryptographic primitives, and plausibility checks mitigating false position injection. Our implementation and initial measurements show that the security overhead is low and the proposed scheme deployable
    corecore