140 research outputs found

    SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust

    Full text link
    The ability to quickly revoke a compromised key is critical to the security of any public-key infrastructure. Regrettably, most traditional certificate revocation schemes suffer from latency, availability, or privacy problems. These problems are exacerbated by the lack of a native delegation mechanism in TLS, which increasingly leads domain owners to engage in dangerous practices such as sharing their private keys with third parties. We analyze solutions that address the long-standing delegation and revocation shortcomings of the web PKI, with a focus on approaches that directly affect the chain of trust (i.e., the X.509 certification path). For this purpose, we propose a 19-criteria framework for characterizing revocation and delegation schemes. We also show that combining short-lived delegated credentials or proxy certificates with an appropriate revocation system would solve several pressing problems.Comment: IEEE European Symposium on Security and Privacy (EuroS&P) 202

    Auditing Symposium XII: Proceedings of the 1994 Deloitte & Touche/University of Kansas Symposium on Auditing Problems

    Get PDF
    Discussant\u27s response to The Acme Financial Statement Insurance Company Inc: A case study / Dan A. Simunic; Behavioral-economics approach to auditors\u27 risk assessments / William S. Waller; Discussant\u27s response to A Behavioral-economics approach to auditors\u27 risk assessments / Peter R. Gillett; Auditing for fraud: Perception vs reality / Alan J. Winters, John B. Sullivan; What we can learn from Yogi Berra: Discussant\u27s response to Auditing for fraud: Perception vs reality / Karen V. Pincus; What\u27s really wrong with the accounting profession? / A. A. Sommer; Client acceptance and continuation decisions / Stephen Asare, Karl Hackenbrack, W. Robert Knechel; Discussant\u27s response to Accounting and auditing history: Major developments in England and the United States from ancient roots through the mid-twentieth century / G. William Graham ; Exploratory analysis of the determinants of audit engagement resource allocations / Timothy B. Bell, W. Robert Knechel, John J. Willingham; Discussant\u27s response to An Exploratory analysis of the determinants of audit engagement resource allocations / Jane F. Mutchler; Investigation of adaptability in evidential planning / Janice D. DiPietro, Theodore J. Mock, Arnold Wright; Accounting and auditing history: Major developments in England and the United States from ancient roots through the mid-twentieth century / Howard Stettler; Discussant\u27s response to An Investigation of adaptability in evidential planning / Norman R. Walker; Acme Financial Statement Insurance Company Inc: A case study / Stephen J. Aldersleyhttps://egrove.olemiss.edu/dl_proceedings/1011/thumbnail.jp

    Junos Pulse Secure Access Service Administration Guide

    Get PDF
    This guide describes basic configuration procedures for Juniper Networks Secure Access Secure Access Service. This document was formerly titled Secure Access Administration Guide. This document is now part of the Junos Pulse documentation set. This guide is designed for network administrators who are configuring and maintaining a Juniper Networks Secure Access Service device. To use this guide, you need a broad understanding of networks in general and the Internet in particular, networking principles, and network configuration. Any detailed discussion of these concepts is beyond the scope of this guide.The Juniper Networks Secure Access Service enable you to give employees, partners, and customers secure and controlled access to your corporate data and applications including file servers, Web servers, native messaging and e-mail clients, hosted servers, and more from outside your trusted network using just a Web browser. Secure Access Service provide robust security by intermediating the data that flows between external users and your company’s internal resources. Users gain authenticated access to authorized resources through an extranet session hosted by the appliance. During intermediation, Secure Access Service receives secure requests from the external, authenticated users and then makes requests to the internal resources on behalf of those users. By intermediating content in this way, Secure Access Service eliminates the need to deploy extranet toolkits in a traditional DMZ or provision a remote access VPN for employees. To access the intuitive Secure Access Service home page, your employees, partners, and customers need only a Web browser that supports SSL and an Internet connection. This page provides the window from which your users can securely browse Web or file servers, use HTML-enabled enterprise applications, start the client/server application proxy, begin a Windows, Citrix, or Telnet/SSH terminal session, access corporate e-mail servers, start a secured layer 3 tunnel, or schedule or attend a secure online meeting

    4th Annual Computer & Technology Law Institute

    Get PDF
    Materials from the 4th Annual Computer & Technology Law Institute held by UK/CLE in November 2002

    Graduate Catalogue 2001-2002

    Get PDF
    https://scholarship.shu.edu/graduate_catalogues/1022/thumbnail.jp

    Graduate Catalogue 2003-2004

    Get PDF
    https://scholarship.shu.edu/graduate_catalogues/1006/thumbnail.jp

    Graduate Catalogue 2002-2003

    Get PDF
    https://scholarship.shu.edu/graduate_catalogues/1007/thumbnail.jp

    Texas Register

    Get PDF
    A weekly publication, the Texas Register serves as the journal of state agency rulemaking for Texas. Information published in the Texas Register includes proposed, adopted, withdrawn and emergency rule actions, notices of state agency review of agency rules, governor's appointments, attorney general opinions, and miscellaneous documents such as requests for proposals. After adoption, these rulemaking actions are codified into the Texas Administrative Code
    • …
    corecore