메뉴 건너뛰기




Volumn 18, Issue 1, 2014, Pages 40-47

Certification authorities under attack: A plea for certificate legitimation

Author keywords

certificate authorization; certificate legitimation; certificate revocation; Internet security; man in the middle attack; public key certificates; public key infrastructure; SSL; TLS

Indexed keywords

CERTIFICATE AUTHORIZATION; CERTIFICATE LEGITIMATION; CERTIFICATE REVOCATION; INTERNET SECURITY; MAN IN THE MIDDLE ATTACKS; PUBLIC KEY CERTIFICATES; PUBLIC KEY INFRASTRUCTURE; SSL; TLS;

EID: 84896469488     PISSN: 10897801     EISSN: None     Source Type: Journal    
DOI: 10.1109/MIC.2013.5     Document Type: Article
Times cited : (9)

References (21)
  • 2
    • 0034581037 scopus 로고    scopus 로고
    • Ten risks of PKI: What you're not being told about public key infrastructure
    • C. Ellison and B. Schneier, "Ten Risks of PKI: What You're Not Being Told about Public Key Infrastructure," Computer Security J., vol. 16, no. 1, 2000, pp. 1-7. (Pubitemid 30565287)
    • (2000) Computer Security Journal , vol.16 , Issue.1 , pp. 1-7
    • Ellison Carl1    Schneier Bruce2
  • 3
    • 0036684150 scopus 로고    scopus 로고
    • PKI: It's not dead, just resting
    • DOI 10.1109/MC.2002.1023787
    • P. Gutmann, "PKI: It's Not Dead, Just Resting," Computer, vol. 35, no. 8, 2002, pp. 41-49. (Pubitemid 34950479)
    • (2002) Computer , vol.35 , Issue.8 , pp. 41-49
    • Gutmann, P.1
  • 4
    • 27844462024 scopus 로고    scopus 로고
    • Why have public key infrastructures failed so far?
    • DOI 10.1108/10662240510629475
    • J. Lopez, R. Oppliger, and G. Pernul, "Why Have Public Key Infrastructures Failed So Far?" Internet Research, vol. 15, no. 5, 2005, pp. 544-556. (Pubitemid 41649219)
    • (2005) Internet Research , vol.15 , Issue.5 , pp. 544-556
    • Lopez, J.1    Oppliger, R.2    Pernul, G.3
  • 6
    • 0003344055 scopus 로고    scopus 로고
    • X.509 Internet public key infrastructure online certificate status protocol-OCSP
    • June
    • M. Myers et al., X.509 Internet Public Key Infrastructure Online Certificate Status Protocol-OCSP, IETF RFC 2560, June 1999; http://tools.ietf. org/html/rfc2560.
    • (1999) IETF RFC , pp. 2560
    • Myers, M.1
  • 7
    • 84857080633 scopus 로고    scopus 로고
    • Certified lies: Detecting and defeating government interception attacks against SSL
    • Springer
    • C. Soghoian and S. Stamm, "Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL," LNCS 7035, Springer, 2012, pp. 250-259.
    • (2012) LNCS , vol.7035 , pp. 250-259
    • Soghoian, C.1    Stamm, S.2
  • 8
    • 49849102924 scopus 로고    scopus 로고
    • SSL/TLS session-aware user authentication
    • R. Oppliger, R. Hauser, and D. Basin, "SSL/TLS Session-Aware User Authentication," Computer, vol. 41, no. 3, 2008, pp. 59-65.
    • (2008) Computer , vol.41 , Issue.3 , pp. 59-65
    • Oppliger, R.1    Hauser, R.2    Basin, D.3
  • 9
    • 79957616447 scopus 로고    scopus 로고
    • Stuxnet: Dissecting a cyberwarfare weapon
    • R. Langner, "Stuxnet: Dissecting a Cyberwarfare Weapon," IEEE Security & Privacy, vol. 9, no. 3, 2011, pp. 49-51.
    • (2011) IEEE Security & Privacy , vol.9 , Issue.3 , pp. 49-51
    • Langner, R.1
  • 12
    • 70849094703 scopus 로고    scopus 로고
    • Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile
    • May
    • D. Cooper et al., Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, IETF RFC 5280, May 2008; http://tools.ietf.org/html/rfc5280.
    • (2008) IETF RFC , pp. 5280
    • Cooper, D.1
  • 13
    • 85180773761 scopus 로고    scopus 로고
    • Building certification paths: Forward vs. Reverse
    • (NDSS 2001), ISOC
    • Y. Elley et al., "Building Certification Paths: Forward vs. Reverse," Proc. 2001 Network and Distributed System Security Symp. (NDSS 2001), ISOC, 2001, pp. 153-160.
    • (2001) Proc. 2001 Network and Distributed System Security Symp , pp. 153-160
    • Elley, Y.1
  • 16
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, no. 11, 1979, pp. 612-613.
    • (1979) Comm. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 17
    • 84890868305 scopus 로고    scopus 로고
    • Public key pinning extension for HTTP
    • work in progress, June
    • C. Evans, C. Palmer, and R. Sheeri, "Public Key Pinning Extension for HTTP," IETF Internet draft, work in progress, June 2013.
    • (2013) IETF Internet Draft
    • Evans, C.1    Palmer, C.2    Sheeri, R.3
  • 18
    • 85030249800 scopus 로고    scopus 로고
    • Use cases and requirements for dns-based authentication of named entities (DANE)
    • Oct.
    • R. Barnes, Use Cases and Requirements for DNS-Based Authentication of Named Entities (DANE), IETF RFC 6394, Oct. 2011; http://tools.ietf.org/html/ rfc6394.
    • (2011) IETF RFC , pp. 6394
    • Barnes, R.1
  • 19
    • 84896456960 scopus 로고    scopus 로고
    • The dns-based authentication of named entities (dane) transport layer security (tls) protocol: Tlsa
    • Aug.
    • P. Hoffman and J. Schlyter, The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA, IETF RFC 6698, Aug. 2012; http://tools.ietf.org/html/rfc6698.
    • (2012) IETF RFC , pp. 6698
    • Hoffman, P.1    Schlyter, J.2
  • 20
    • 33144460479 scopus 로고    scopus 로고
    • DNS security introduction and requirements
    • Mar.
    • R. Arends et al., DNS Security Introduction and Requirements, IETF RFC 4033, Mar. 2005; http://tools. ietf.org/html/rfc4033.
    • (2005) IETF RFC , pp. 4033
    • Arends, R.1
  • 21
    • 85034040740 scopus 로고    scopus 로고
    • Perspectives: Improving ssh-style host authentication with multi-path probing
    • Usenix Assoc.
    • D. Wendtandt, D.G. Andersen, and A. Perrig, "Perspectives: Improving SSH-Style Host Authentication with Multi-Path Probing," Proc. Usenix 2008 Annual Tech. Conf. (ATC 08), Usenix Assoc., 2008, pp. 321-334.
    • (2008) Proc. Usenix 2008 Annual Tech. Conf. (ATC 08) , pp. 321-334
    • Wendtandt, D.1    Andersen, D.G.2    Perrig, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.