Spelling suggestions: "subject:"cublic key infrastructure"" "subject:"bublic key infrastructure""
51 |
VLSI implementation of a Montgomery modular multiplier /Wang, Xin. January 1900 (has links)
Thesis (M.App.Sc.) - Carleton University, 2006. / Includes bibliographical references (p. 80-82). Also available in electronic format on the Internet.
|
52 |
Uma arquitetura para autenticação de dispositivos móveis através de uma infra-estrutura de chave pública. / An architecture for authentication of mobile devices through a public key infrastructure.CAMINHA, Jean. 20 August 2018 (has links)
Submitted by Johnny Rodrigues (johnnyrodrigues@ufcg.edu.br) on 2018-08-20T20:19:30Z
No. of bitstreams: 1
JEAN CAMINHA - DISSERTAÇÃO PPGEE 2006..pdf: 1518338 bytes, checksum: e7ba2faff350c19009f55c5eec73fc4a (MD5) / Made available in DSpace on 2018-08-20T20:19:30Z (GMT). No. of bitstreams: 1
JEAN CAMINHA - DISSERTAÇÃO PPGEE 2006..pdf: 1518338 bytes, checksum: e7ba2faff350c19009f55c5eec73fc4a (MD5)
Previous issue date: 2006-12-22 / A identificação de objetos que participam de uma arquitetura de processamento
de dados é uma preocupação relevante para a segurança das informações e fator
decisivo para a utilização de serviços que utilizam dados sensíveis. Este trabalho propõe
uma arquitetura para a autenticação de dispositivos móveis utilizando a Infra-estrutura
de Chave Pública (PKI) e o Protocolo de Iniciação de Sessões (SIP) de modo a
minimizar as limitações de armazenamento e processamento destes aparelhos. / The identification of objects that participates of architecture of data processing is
a concern for information security and decisive factor for services that need manipulate
sensible data. This work considers architecture for mobile devices authentication
through in a Public Key Infrastructure and the Session Initiation Protocol (SIP) as a way
to minimize storage and processing limitations of those devices.
|
53 |
Modernização dos processos de auditoria e fiscalizaçao da ICP BrasilCosta, Fabricio Abrão 22 June 2010 (has links)
Made available in DSpace on 2016-12-01T19:18:49Z (GMT). No. of bitstreams: 1
Fabricio1.pdf: 69759 bytes, checksum: 0fdd39ba777606ce0670212bb86298e2 (MD5)
Previous issue date: 2010-06-22 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior / The Brazilian Public Key Infrastructure is a set of techniques, architectures, organization, practices and procedures defined by brazilian government and private organizations that support, in overall, the implementation and operation of a
certification system. The product of the organizations that form this structure is the digital certificate, a particular electronic document of a person or organization which
guarantees the authenticity, integrity and legal validity of documents in electronic form and enables safes electronic transactions. The entities that are part of Brazilian Public Key Infrastructure receive constant audits to verify and control the perfect follow all the rules that are submitted in order to ensure quality and reliability of services offered. Although the structure of entities exist on the basis of digital certification and trust in the electronic documents and digital transactions, their process of auditing and supervision are not using and enjoying fully all the advantages and facilities that the digital certificate, electronic document and information technology and communication provides. This work focuses on the modernization and automation of these processes. In the survey was used a theoretical-empirical approach using the literature review on the subject and research in normative documents of Brazilian Public Key Infrastructure to understand the current status of their audit procedures and be able to develop and propose a new methodology to achieve automated auditing and supervision of entities of the
structure, using digital certification and electronic document transactions between the system and its users. Research shows that the new methodology proposal is feasible
and can be implemented, but needs more studies to be able to deploy it / A Infraestrutura de Chaves Públicas Brasileira é um conjunto de técnicas, arquiteturas, organização, práticas e procedimentos, definidos pelas organizações governamentais e privadas brasileiras que suportam, em conjunto, a implementação e a operação de um sistema de certificação. O produto das organizações que formam essa estrutura é o certificado digital, um documento eletrônico particular de
uma pessoa física ou jurídica que garante a autenticidade, integridade e validade jurídica de documentos em forma eletrônica e possibilita as transações eletrônicas seguras. As entidades que fazem parte da Infraestrutura de Chaves Públicas Brasileira recebem auditorias constantes a fim de verificar e controlar o perfeito seguimento de todas as normas a que estão submetidas, de modo a garantir a qualidade e confiabilidade dos serviços oferecidos. Apesar das entidades da estrutura existirem em função da certificação digital e da confiança nos documentos e nas transações eletrônicas, seus processos de auditoria e fiscalização não utilizam plenamente todas as vantagens e facilidades que o certificado digital, o documento eletrônico e a tecnologia da informação e comunicação proporcionam. O presente trabalho foca na modernização e automação destes processos. Na pesquisa foi
utilizada uma abordagem teórico-empírica, utilizando a revisão da literatura sobre o assunto e a pesquisa nos documentos de normatização da Infraestrutura de Chaves Públicas Brasileira para entender a atual situação dos seus processos de auditoria e poder desenvolver e propor uma nova metodologia para a realização automatizada da auditoria e fiscalização das entidades da estrutura, utilizando a certificação digital
e o documento eletrônico nas transações entre o sistema e seus usuários. A pesquisa mostra que a nova metodologia proposta é viável e possível de ser implementada, porém necessita de mais estudos para ser possível implantá-la
|
54 |
Segurança em grades computacionais / Security in grid computingPedroso, Edson Tessarini 26 July 2006 (has links)
Orientador: Ricardo Dahab / Dissertação (mestrado profissional) - Universidade Estadual de Campinas, Instituto de Computação / Made available in DSpace on 2018-08-08T18:08:23Z (GMT). No. of bitstreams: 1
Pedroso_EdsonTessarini_M.pdf: 1601998 bytes, checksum: a37e50088eb3b06977e4d812a3951695 (MD5)
Previous issue date: 2006 / Resumo: Grade computacional é um conceito que explora as potencialidades das redes de computadores, com o objetivo específico de disponibilizar camadas virtuais que permitem a um usuário ter acesso a aplicações altamente exigentes, bem como aderir a comunidades virtuais de grande escala, com uma grande diversidade de recursos de computação e de repositórios de informações. Grades computacionais são sistemas de suporte à execução de aplicações paralelas que acoplam recursos heterogêneos distribuídos, oferecendo acesso consistente e barato aos recursos, independente de sua posição geográfica. As tecnologias de grades computacionais possibilitam agregar recursos computacionais variados e dispersos, acelerando a execução de vários processos computacionais. Para melhor entendimento das questões de segurança, principal foco deste trabalho, um estudo geral sobre a grade computacional envolvendo assuntos como arquitetura, funcionalidades, aplicações e serviços, foi realizado com o objetivo de identificar e demonstrar a complexidade existente por trás destes cenários. As exigências de segurança são fundamentais a um projeto de grade computacional. Os componentes de segurança devem fornecer os mecanismos corretos para uma comunicação segura em um ambiente de grade. Sem estes mecanismos, as informações processadas dentro da grade tornam-se vulneráveis. O propósito deste trabalho é a realização de um levantamento sobre as questões de segurança em grade computacional, identificando problemas existentes, soluções, arquiteturas, ferramentas e técnicas aplicadas. Com base nessas informações é possível entender como funcionam os mecanismos de segurança em grade, identificando o que já existe de efetivo e quais as necessidades para que a maturidade e popularidade neste ambiente possam ocorrer / Abstract: Grid computing is a concept that exploits the power of computer networks, with the specific aim of making virtual layers available that allow users to have access to highly demanding applications, as well as to adhere to large scale, highly diverse, virtual communities. Grid computing provides support for the execution of parallel applications, grouping together distributed heterogeneous resources, offering consistent and inexpensive access to them, independently of their geographical location. The technology of grid computing allow the gathering of different and disperse computer resources, accelerating the execution of various computer processes. To better understand security issues in grids, the principal focus of this work, a general study of grid computing including architecture, functionalities, applications and services was done, with the goal of identifying and demonstrating the existent complexity behind this scenery. Security is fundamental to a grid project. Security components must supply the correct mechanisms for secure communication, without which processed information inside a grid becomes vulnerable. The purpose of this work is to survey security issues in grid computing, identifying existent problems, solutions, architectures, tools and techniques. Based on this information it is possible to understand how security mechanisms in grids work, identifying those mechanisms already in place and working, as well as what is needed for the full development of grid computing / Mestrado / Mestre Profissional em Computação
|
55 |
En säkerhetsgranskning av Secure Application FrameworkNorling, Sebastian January 2013 (has links)
Företaget Wireless Independent Provider (WIP) har tagit fram ett säkerhetsramverk vid namn Secure Application Framework (SAF) som är ett väldokumenterat ramverk för att skapa säkra interna företagsappar. Syftet med detta ramverk är att lösa problematiken kring Bring Your Own Device (BYOD) – hur man ska skilja på privat data och företagets data i enheten. Med ett sådant system så finns det mycket att tänka på rörande säkerheten. Genom att identifiera ett antal olika hot och genomföra en riskanalys på dessa kommer man fram till att systemet är skyddat mot majoriteten av hoten, det finns dock förslag till förbättringar på enstaka delar av systemet. Det genomförs även prestandatester och undersökning av lavineffekten för ett antal olika symmetriska krypteringsalgoritmer i syfte att fastslå om den använda algoritmen i systemet har fördelar jämfört med andra moderna krypteringsalgoritmer. Utifrån resultaten som tagits fram i detta arbete så konstateras det att skyddet mot de identifierade hoten är mycket bra samt att det inte finns någonting som skulle motivera ett byte av den symmetriska krypteringsalgoritmen.
|
56 |
Certifikační autorita / Certification authorityHerinek, Denis January 2018 (has links)
There is a lot of available services on the internet those need to be more secured and trusted. Public key infrastructure is used in sectors where are higher expectations in case of authentication, integrity and confidentality. It is almost impossible to imagine how internet banking or electronic signatures of important documents would work without PKI. There is a lot of open-source realisations of PKI created by users. Digital certificates as a part of PKI are issued by certificate authorities. This diploma thesis consists of open- source realisation of certificate authority and timestamping authority to demonstrate services which they provide.
|
57 |
網路交易之風險分析與建議-以旅遊業為例 / Risk analysis & suggestion of Internet transaction呂雅麗, Lu, Ya Li Unknown Date (has links)
在網路環境日益成熟的今日,網路交易的安全性已被列為首要的課題,而「公開金鑰基礎建設(public key infrastructure, PKI)」被公認是在資訊安全應用領域中,少數能同時滿足「保護資料安全」、「身分驗證」、「訊息完整性」以及「交易不可否認性」的加密應用技術。
電子商務被運用於各行各業,其中旅遊產業是全球最大與成長最快的產業之ㄧ。許多網路旅行社已經在企業內部建置了企業資源規劃(enterprise resource planning, ERP)系統,使得幾乎全部的交易與旅遊的安排都可以在線上完成。為了確保資料交換的安全性,便可以使用PKI技術,使企業的ERP 成為受完整加密保護的服務網路。
網路旅遊業者是以網站營運的方式來進行與消費者的互動,除了基本的防護措施,如:防火牆、入侵偵測、弱點掃瞄等網路安全外,企業的資安政策的制定與執行都可減少企業所面臨的風險。
近年來資料外洩事件頻傳,客戶資料及公司智慧財產外洩可能導致罰鍰、訴訟、公司品牌形象的毀損等。政府積極推動個人資料保護法,為了提高約束力,立法、司法與行政部門決定聯手祭出「天文數字的重罰」加以遏止;加上惡意使用者偽卡盜刷、冒名使用,使得電子商務業者不得不審慎地去評估如何加強資訊安全,以維繫企業本身的利益及提高企業的競爭力。
PKI的技術是目前公認最可靠、最可被信任的方式,但建置的複雜性及高成本,使得PKI的推廣層面不夠普及;如何讓PKI由「技術」移轉成為成功的「應用」,故筆者在本論文中建議一個運作模式,讓網路旅行社可以在透過網際網路行銷擴大業務之餘,也能因應時勢所趨,提供給其客戶一個安全的網路交易環境。 / The safety of Internet transaction has been referred to as the most important task in this fully-developed world of Internet. And public key infrastructure, which can provide confidentiality, authentication, integrity and non-repudiation, is one of the most effective ways of encryption in the application of information security.
The travel agency has been one of the largest industries in e-commerce. There are many enterprise resource planning systems built in online travel agencies, so that almost every transaction and tours can be arranged through the Internet. To provide a well-protected environment, enterprises can use PKI technology to ensure the safety of online data exchanging.
Online travel agencies interact with consumers through the web-site. Not only the basic protection like firewall, intrusion detection, and vulnerability scanning but also the development and the executive of security policies can reduce the risk that enterprises may encounter.
Fines, litigations and the company's brand image damages may come after data leakages such as information of clients or intellectual property of companies. Government has actively promoted personal data protection law and huge amount of fines to improve the bindings. Coupled with many fraud credit cards used by the malicious users, companies have to assess how to reinforce information security to maintain its profit and upgrade its competitiveness.
PKI technology is recognized as the most reliable and trusted solution, but the complexities and high cost of implementation made it difficult to apply. So, the author here tries to provide a mode of operation for online travel agencies to not only extend its services by the Internet but also provide a safe Internet transaction environment for its clients.
|
58 |
The use of technology to automate the registration process within the Torrens system and its impact on fraud : an analysisLow, Rouhshi January 2008 (has links)
Improvements in technology and the Internet have seen a rapid rise in the use of technology in various sectors such as medicine, the courts and banking. The conveyancing sector is also experiencing a similar revolution, with technology touted as able to improve the effectiveness of the land registration process. In some jurisdictions, such as New Zealand and Canada, the paper-based land registration system has been replaced with one in which creation, preparation, and lodgement of land title instruments are managed in a wholly electronic environment. In Australia, proposals for an electronic registration system are under way. The research question addressed by this thesis is what would be the impact on fraud of automating the registration process. This is pertinent because of the adverse impact of fraud on the underlying principles of the Torrens system, particularly security of title. This thesis first charts the importance of security of title, examining how security of title is achieved within the Torrens system and the effects that fraud has on this. Case examples are used to analyse perpetration of fraud under the paper registration system. Analysis of functional electronic registration systems in comparison with the paper-based registration system is then undertaken to reveal what changes might be made to conveyancing practices were an electronic registration system implemented. Whether, and if so, how, these changes might impact upon paper based frauds and whether they might open up new opportunities for fraud in an electronic registration system forms the next step in the analysis. The final step is to use these findings to propose measures that might be used to minimise fraud opportunities in an electronic registration system, so that as far as possible the Torrens system might be kept free from fraud, and the philosophical objectives of the system, as initially envisaged by Sir Robert Torrens, might be met.
|
59 |
Infrastruktura veřejných klíčů / Infrastructure of public keysBědajánek, Ondřej January 2008 (has links)
The subject of my thesis dscribes function and principles of the public key infrastructure as well as certificate authority. Under the operation system Linux was created self signed certificate authority. Web interface was devoloped in PHP for the purpose of the generation, distribution and rejection certificates. Configuration files for OpenVPN are included in the thesis and wireless security is achived by OpenVPN.
|
60 |
Laboratorní úloha infrastruktury veřejných klíčů / Lab of public key infrastructureSlavík, Petr January 2009 (has links)
The aim of this thesis is to study and describe the theme of Public Key Infrastructure (PKI). Within the scope of minute PKI characterization there is a gradual depiction of particular structural elements, which are above all represented by cryptographic operations (asymetric and symetric cryptography, hash function and digital signature); then, there are also individual PKI subjects that are dealt with, like eg. certification authority, certificates, security protocols, secure heap etc. Last but not least there are a few complete Public Key Infrastructure implementation solutions described (OpenSSL, Microsft CA). The practical part of the thesis, a lab exercise, gives potential students the knowledge of installing OpenSSL system based certification authority. The next task educate students how to secure web server with certificate signed with own CA and also how to secure web server users‘ access control through certificates signed by the previously installed CA.
|
Page generated in 0.1 seconds