1 |
Selling Telemetry Data Over the Internet Using SETKalibjian, Jeffrey R. 10 1900 (has links)
International Telemetering Conference Proceedings / October 26-29, 1998 / Town & Country Resort Hotel and Convention Center, San Diego, California / Over the past two years the design and implementation of secure Internet based data sharing tools which could enable geographically remote contractor teams to access flight and test telemetry data securely over the Internet were presented [1] [2]. Key technologies facilitating these capabilities were the Hypertext Transfer (HTTP) protocol , the Secure Sockets Layer (SSL) protocol, and the Secure Multipurpose Internet Mail Extension (S/MIME) specification . This year we discuss utilizing the Secure Electronic Transaction (SET) specification in tandem with HTTP, SSL, and S/MIME to deploy a system for securely selling telemetry data over the Internet.
|
2 |
Telemetry Data Sharing Using S/MIMEKalibjian, Jeffrey R. 10 1900 (has links)
International Telemetering Conference Proceedings / October 27-30, 1997 / Riviera Hotel and Convention Center, Las Vegas, Nevada / Last year the design and implementation of a secure World Wide Web based data sharing
tool which could enable geographically remote contractor teams to access flight and test
telemetry data securely over the Internet was presented [1]. Key technologies facilitating
this capability were the Hypertext Transfer Protocol (HTTP) and the Secure Sockets Layer
(SSL) capable web browsers and web servers. This year the applicability of the Secure
Multipurpose Internet Mail Extension (S/MIME) specification is being evaluated for the
transport of telemetry data via secure E-mail.
|
3 |
Trusted Mail GatewayAyla, Erkut Sinan 01 January 2005 (has links) (PDF)
ABSTRACT
TRUSTED MAIL GATEWAY
AYLA, Erkut Sinan
M.S., Department of Computer Engineering
Supervisor: Dr. Attila Ö / zgit
December 2004, 135 pages
The study aims to make contribution to solve mail security problems. The
Trusted Mail Gateway provides a domain with the basic security services
that are message integrity, confidentiality, non& / #8208 / repudiation, origin
authentication and availability while message (e& / #8208 / mail) being delivered
through the Internet. It generates S/MIME digital signatures and performs
S/MIME encryption on behalf of the domain using secret key
cryptography and public& / #8208 / key techniques and generating Cryptographic
Message Syntax (CMS) data to provide origin authenticity, integrity and
v
confidentiality. It applies anti& / #8208 / virus control and protection, spam filtering
and content check to both incoming mails to the domain and outgoing
mails from the domain to prevent attacks against availability. Also, the
Trusted Mail Gateway provides intra& / #8208 / domain security. It keeps e& / #8208 / mail
messages in corresponding mailboxes as encrypted messages. Trusted
Mail Gateway processes all the mails passing through and records
processing results in database as notary information. Moreover, it
establishes trust relations with other trusted domains and exchanges
notary information with them via a secure channel.
Keywords: S/MIME, security services, mail protocols, domain, notary
|
4 |
Rekommendationer för införande av public key infrastructure / Recommendations for implementing Public Key InfrastructureAndersson, Johan January 2002 (has links)
<p>The use of insecure networks -such as the Internet- to send and receive information has made the need for preventing unauthorised people reading it yet more important. One of the easiest way to do this is through public key cryptography. However, the problem with this solution is how to tie a specific public key to a certain subject. This is solved by letting a trusted third party issue a certificate that holds, as a minimum, the name of the subject and the subject's public key along with the issuer's digital signature on the information. The rules we make for issuing, revoking and verifying of certificates and the entities that are being used to do so are called PKI - Public Key Infrastructure. In this thesis we shall se what PKI really is in a more detailed way and which entities it constitutes of. We will also investigate some of the areas in which we could make use of it, for instance secure e-mail and virtual private networks. Next, we will look into some of the drawbacks with PKI and what you should think of in order to aviod these. Finally, we'll give recommendations for the implementation itself. As for the theory of cryptography, the basics is presented to the interested reader in a separate appendix.</p>
|
5 |
Rekommendationer för införande av public key infrastructure / Recommendations for implementing Public Key InfrastructureAndersson, Johan January 2002 (has links)
The use of insecure networks -such as the Internet- to send and receive information has made the need for preventing unauthorised people reading it yet more important. One of the easiest way to do this is through public key cryptography. However, the problem with this solution is how to tie a specific public key to a certain subject. This is solved by letting a trusted third party issue a certificate that holds, as a minimum, the name of the subject and the subject's public key along with the issuer's digital signature on the information. The rules we make for issuing, revoking and verifying of certificates and the entities that are being used to do so are called PKI - Public Key Infrastructure. In this thesis we shall se what PKI really is in a more detailed way and which entities it constitutes of. We will also investigate some of the areas in which we could make use of it, for instance secure e-mail and virtual private networks. Next, we will look into some of the drawbacks with PKI and what you should think of in order to aviod these. Finally, we'll give recommendations for the implementation itself. As for the theory of cryptography, the basics is presented to the interested reader in a separate appendix.
|
Page generated in 0.0217 seconds