4 research outputs found

    2014 White Paper on ICT in education Korea

    Get PDF

    Understanding the trust relationships of the web PKI

    Get PDF
    TLS and the applications it secures (e.g., email, online banking, social media) rely on the web PKI to provide authentication. Without strong authentication guarantees, a capable attacker can impersonate trusted network entities and undermine both data integrity and confidentiality. At its core, the web PKI succeeds as a global authentication system because of the scalability afforded by trust. Instead of requiring every network entity to directly authenticate every other network entity, network entities trust certification authorities (CAs) to perform authentication on their behalf. Prior work has extensively studied the TLS protocol and CA authentication of network entities (i.e., certificate issuance), but few have examined even the most foundational aspect of trust management and understood which CAs are trusted by which TLS user agents, and why. One major reason for this disparity is the opacity of trust management in two regards: difficult data access and poor specifications. It is relatively easy to acquire and test popular TLS client/server software and issued certificates. On the other hand, tracking trust policies/deployments and evaluating CA operations is less straightforward, but just as important for securing the web PKI. This dissertation is one of the first attempts to overcome trust management opacity. By observing new measurement perspectives and developing novel fingerprinting techniques, we discover the CAs that operate trust anchors, the default trust anchors that popular TLS user agents rely on, and a general class of injected trust anchors: TLS interceptors. This research not only facilitates new ecosystem visibility, it also provides an empirical grounding for trust management specification and evaluation. Furthermore, our findings point to many instances of questionable, and sometimes broken, security practices such as improperly identified CAs, inadvertent and overly permissive trust, and trivially exploitable injected trust. We argue that most of these issues stem from inadequate transparency, and that explicit mechanisms for linking trust anchors and root stores to their origins would help remedy these problems

    Mobile Ad-Hoc Networks

    Get PDF
    Being infrastructure-less and without central administration control, wireless ad-hoc networking is playing a more and more important role in extending the coverage of traditional wireless infrastructure (cellular networks, wireless LAN, etc). This book includes state-of the-art techniques and solutions for wireless ad-hoc networks. It focuses on the following topics in ad-hoc networks: vehicular ad-hoc networks, security and caching, TCP in ad-hoc networks and emerging applications. It is targeted to provide network engineers and researchers with design guidelines for large scale wireless ad hoc networks

    Enforceability of electronic contracts in Australia

    Get PDF
    Electronic contracts must be legally enforceable and certain like traditional contracts, to establish a similar legal framework in an electronic environment. The Electronic Transaction Legislation of Australia has made an attempt to strengthen legal certainty of electronic framework while ensuring law keeps pace with technological development. Despite this, the enforceability of electronic contracts is not as certain and predictable as those of traditional paper-based contracts. These problems arise due to regulatory deficiencies. Different approaches to address this issue have been adopted by jurisdictions such as the United States (US) and the United Kingdom (UK); however, the issue has not been adequately resolved in these jurisdictions. At the international level, various organisations such as the United Nations Commission on International Trade Law (UNCITRAL), the Organisation for Economic Co-operation and Development (OECD), the International Chamber of Commerce (ICC) and are working in close cooperation to resolve uncertainty surrounding electronic contracts. International developments also present the same deficiencies as are present at the national level. This thesis examines the current laws and reviews how international norms emerged and continue to resolve the issues
    corecore