140 research outputs found
SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust
The ability to quickly revoke a compromised key is critical to the security
of any public-key infrastructure. Regrettably, most traditional certificate
revocation schemes suffer from latency, availability, or privacy problems.
These problems are exacerbated by the lack of a native delegation mechanism in
TLS, which increasingly leads domain owners to engage in dangerous practices
such as sharing their private keys with third parties.
We analyze solutions that address the long-standing delegation and revocation
shortcomings of the web PKI, with a focus on approaches that directly affect
the chain of trust (i.e., the X.509 certification path). For this purpose, we
propose a 19-criteria framework for characterizing revocation and delegation
schemes. We also show that combining short-lived delegated credentials or proxy
certificates with an appropriate revocation system would solve several pressing
problems.Comment: IEEE European Symposium on Security and Privacy (EuroS&P) 202
Auditing Symposium XII: Proceedings of the 1994 Deloitte & Touche/University of Kansas Symposium on Auditing Problems
Discussant\u27s response to The Acme Financial Statement Insurance Company Inc: A case study / Dan A. Simunic; Behavioral-economics approach to auditors\u27 risk assessments / William S. Waller; Discussant\u27s response to A Behavioral-economics approach to auditors\u27 risk assessments / Peter R. Gillett; Auditing for fraud: Perception vs reality / Alan J. Winters, John B. Sullivan; What we can learn from Yogi Berra: Discussant\u27s response to Auditing for fraud: Perception vs reality / Karen V. Pincus; What\u27s really wrong with the accounting profession? / A. A. Sommer; Client acceptance and continuation decisions / Stephen Asare, Karl Hackenbrack, W. Robert Knechel; Discussant\u27s response to Accounting and auditing history: Major developments in England and the United States from ancient roots through the mid-twentieth century / G. William Graham ; Exploratory analysis of the determinants of audit engagement resource allocations / Timothy B. Bell, W. Robert Knechel, John J. Willingham; Discussant\u27s response to An Exploratory analysis of the determinants of audit engagement resource allocations / Jane F. Mutchler; Investigation of adaptability in evidential planning / Janice D. DiPietro, Theodore J. Mock, Arnold Wright; Accounting and auditing history: Major developments in England and the United States from ancient roots through the mid-twentieth century / Howard Stettler; Discussant\u27s response to An Investigation of adaptability in evidential planning / Norman R. Walker; Acme Financial Statement Insurance Company Inc: A case study / Stephen J. Aldersleyhttps://egrove.olemiss.edu/dl_proceedings/1011/thumbnail.jp
Junos Pulse Secure Access Service Administration Guide
This guide describes basic configuration procedures for Juniper Networks Secure Access
Secure Access Service. This document was formerly titled Secure Access Administration
Guide. This document is now part of the Junos Pulse documentation set.
This guide is designed for network administrators who are configuring and maintaining
a Juniper Networks Secure Access Service device. To use this guide, you need a broad
understanding of networks in general and the Internet in particular, networking principles, and network configuration. Any detailed discussion of these concepts is beyond the scope of this guide.The Juniper Networks Secure Access Service enable you to give employees, partners,
and customers secure and controlled access to your corporate data and applications
including file servers, Web servers, native messaging and e-mail clients, hosted servers,
and more from outside your trusted network using just a Web browser.
Secure Access Service provide robust security by intermediating the data that flows
between external users and your company’s internal resources. Users gain authenticated
access to authorized resources through an extranet session hosted by the appliance.
During intermediation, Secure Access Service receives secure requests from the external,
authenticated users and then makes requests to the internal resources on behalf of those
users. By intermediating content in this way, Secure Access Service eliminates the need
to deploy extranet toolkits in a traditional DMZ or provision a remote access VPN for
employees.
To access the intuitive Secure Access Service home page, your employees, partners, and
customers need only a Web browser that supports SSL and an Internet connection. This
page provides the window from which your users can securely browse Web or file servers,
use HTML-enabled enterprise applications, start the client/server application proxy,
begin a Windows, Citrix, or Telnet/SSH terminal session, access corporate e-mail servers,
start a secured layer 3 tunnel, or schedule or attend a secure online meeting
4th Annual Computer & Technology Law Institute
Materials from the 4th Annual Computer & Technology Law Institute held by UK/CLE in November 2002
Graduate Catalogue 2001-2002
https://scholarship.shu.edu/graduate_catalogues/1022/thumbnail.jp
Graduate Catalogue 2003-2004
https://scholarship.shu.edu/graduate_catalogues/1006/thumbnail.jp
Recommended from our members
Federal Register
Daily publication of the U.S. Office of the Federal Register contains rules and regulations, proposed legislation and rule changes, and other notices, including "Presidential proclamations and Executive Orders, Federal agency documents having general applicability and legal effect, documents required to be published by act of Congress, and other Federal agency documents of public interest" (p. ii). Table of Contents starts on page iii
Graduate Catalogue 2002-2003
https://scholarship.shu.edu/graduate_catalogues/1007/thumbnail.jp
Texas Register
A weekly publication, the Texas Register serves as the journal of state agency rulemaking for Texas. Information published in the Texas Register includes proposed, adopted, withdrawn and emergency rule actions, notices of state agency review of agency rules, governor's appointments, attorney general opinions, and miscellaneous documents such as requests for proposals. After adoption, these rulemaking actions are codified into the Texas Administrative Code
- …