Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2018, International Journal of Information Management
…
3 pages
1 file
The researcher opens with a brief description of symmetric and asymmetric encryption systems. Then the researcher presents an analysis, comparisons of asymmetric and symmetric encryption schemes and advantages and disadvantages of PKI (Public Key Infrastructure). Asymmetric encryption systems use different transmitter and receiver keys, and it is very difficult to derive one key from the other. Symmetric systems use one shared key. PKI is a set of hardware, software, policies, and technicians to manage an environment using public key digital certificates. The researcher addresses security, PKI, and solutions within cloud technology.
As security is essential in communications through electronic networks, development of structures providing high levels of security is needed. Public Key Infrastructure (PKI) is a way of providing security measures by implementing the means of key pairs among users. In this paper, an overview of the public key infrastructure is discussed that includes various components and operation, some well known PKIs and their comparisons. Also we discuss current implementations, risk and challenges of PKIs.
IACR Cryptol. ePrint Arch., 2019
Traditional Certificatebased public key infrastructure (PKI) suffers from the problem of certificate overhead like its storage, verification, revocation etc. To overcome these problems, idea of certificate less identity-based public key cryptography (ID-PKC) was proposed by Shamir. This is suitable for closed trusted group only. Also, this concept has some inherent problems like key escrow problem, secure key channel problem, identity management overhead etc. Later on, there had been several works which tried to combine both the cryptographic techniques such that the resulting hybrid PKI framework is built upon the best features of both the cryptographic techniques. It had been shown that this approach solves many problems associated with an individual cryptosystem. In this paper, we have reviewed and compared such hybrid schemes which tried to combine both the certificate based PKC and ID-based PKC. Also, the summary of the comparison, based on various features, is presented in a t...
2012
Cloud services have grown very quickly over the past couple of years, giving consumers and companies the chance to put services, resources and infrastructures in the hands of a provider. There are big security concerns when using cloud services. With the emergence of cloud computing, Public Key Infrastructure (PKI) technology has undergone a renaissance, enabling computer to computer communications. This study describes use of PKI in cloud computing and provides insights into some of the challenges which cloud-based PKI systems face.
2019
PKI architecture is base of e-business security in an insecure Internet environment for a geographically distributed organization. Choosing an adequate PKI architecture is a real challenge. Each PKI architecture has its advantages and disadvantages which should be taken into consideration before choosing the one. Therefore, authors in this paper give description and comparative analysis of the basic PKI architectures. This analysis has two aspects: first, comparison of advantages and disadvantages, and second, aspect of parameters chosen by the authors. Chosen parameters are: trust, certification path, scalability, flexibility and failure.
International journal of innovations in engineering and science, 2022
The term "cryptography," which literally translates to "secret writing," has emerged as the fundamental building block for supplying security for numerous communication applications. There is a need to conceal sensitive information, such as passwords, encryption keys, recipes, etc. in many applications, especially in group communication. Here, effective key management policies are needed to protect the group's confidential information. Because it can be exceedingly difficult to preserve a group's secret information, especially in two situations: when there are more group members and when they are dispersed across different locations with different defences in place. the cloud computing model, where application services are delivered online. A flexible, affordable, and tested platform for delivering commercial or consumer IT services over the internet is cloud computing. Along with more computer power, the cloud also offers network infrastructure that facilitates group communication scenarios. Several security methods are needed to communicate with the various cloud services and to store the data produced/processed by those services. This paper examines the fundamental issue of cloud computing key management in this context and provides support for communication between cloud cryptography clients and cloud key management servers. Cloud key management, including its development and subsequent use to lower infrastructure costs, hazards, and complexity associated with managing encryption keys, as well as to improve the functionality of both private and public storage clouds, is covered. This study explores an extensive assessment of current key management methods used to secure cloud computing.
Encyclopedia of Cryptography and Security, 2005
This book contains the proceedings of the 5th European Public Key Infrastructure Workshop: Theory and Practice, EuroPKI 2008, which was held on the NTNU campus Gløshaugen in Trondheim, Norway, in June 2008. The EuroPKI workshop series focuses on all research and practice aspects of public key infrastructures, services and applications, and welcomes original research papers and excellent survey contributions from academia, government, and industry. Simply put, public keys are easier to distribute than secret keys. Nevertheless, constructing effective, practical, secure and low cost means for assuring authenticity and validity of public keys used in large-scale networked services remains both a technological and organizational challenge. In a nutshell, this is the PKI problem, and the papers presented herein propose new solutions and insight for these questions. This volume holds 16 refereed papers including the presentation paper by the invited speaker P. Landrock. In response to the EuroPKI 2008 call for papers, a total of 37 paper proposals were received. All submissions underwent a thorough blind review by at least three PC members, resulting in a careful selection and revision of the accepted papers. The authors came from 10 countries: Belgium,
Encyclopedia of Strategic Leadership and Management, 2017
Those who are more committed to their organizations are assumed to be more productive persons and behave with a higher sense of responsibility and loyalty (Ulrich, 1998). Several different definitions of commitment exist in the literature. Buchanan's (1974) definition is typical: "Commitment is viewed as a partisan, affective attachment to the goals and values of an organization, to one's role in relation to goals and values, and to the organization for its own sake, apart from its pruly instrumental worth" (p. 533). In the definition of Wiener (1982) commitment is conceptualized as a normative motivational process clearly distinctive from instrumental approaches to the explanation of work behavior. Tsui, Egan, and O'Reilly (1992) defined it as an employees' psychological and behavioral attachment to a social group. Scheldon's (1971) definition combines commitment with identification words. He viewed commitment as a psychological attachment
Classical Antiquity and Medieval Ireland: An Anthology of Medieval Irish Texts and Interpretations, 2024
Edition, translation, and discussion of a hitherto unpublished passage from the copy of Auraicept na nÉces in the Book of Uí Mhaine. The chapter is part of an anthology edited by Michael Clarke, Erich Poppe, and Isabelle Torrance.
This study examines the impact of Amalgamation of tax revenue mobilization in Ghana using GRA within kumasi metropolis
Fortgeschriebenes Gotteswort. Studien zu Geschichte, Theologie und Auslegung des Alten Testaments. Christoph Levin Festschrift (Tübingen: Mohr/Siebeck), 153-174, 2020
Australian Historical Studies, 2015
Tempi di Unità", Periodico della Comunità di Gesù - n. 3 Maggio 2005.
Cypriot Journal of Educational Sciences
Der Polnische Film. Von seinen Anfängen bis zur Gegenwart, 2012
CERN European Organization for Nuclear Research - Zenodo, 2013
Economics Bulletin, 2010
Journal of Neurology, Neurosurgery & Psychiatry, 2005
International Journal of Environmental Research and Public Health
Mathematische Zeitschrift, 1985
Chinese Journal of Academic Radiology, 2020
Atlas Nacional Interactivo de Argentina. Instituto Geográfico Nacional. , 2020
2005
Interdisciplinaria. Revista de Psicología y Ciencias Afines
Journal of Natural Resources and Development, 2011