This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
For more than a decade, Internet users have relied on digital certificates issued by certificate authorities to encrypt and authenticate their most valuable communications. Computer security experts have lambasted weaknesses in the system since its inception. Recent exploits have brought several problems back into stark focus. The authors describe some proposed technology-based improvements, as well as some legal, economic, and organizational shortcomings of the trust model. They also propose first steps toward fixes and next steps for study.
Index Terms:
Blogs,Internet,Privacy,Computational modeling,Cryptography,Authentication,Legal factors,Law,Public key cryptography,Computer security,Access control,public-key cryptosystems,public policy,legal implications
Citation:
S. B. Roosa, S. Schultze, "Trust Darknet: Control and Compromise in the Internet's Certificate Authority Model," IEEE Internet Computing, vol. 17, no. 3, pp. 18-25, May-June 2013, doi:10.1109/MIC.2013.27
Usage of this product signifies your acceptance of the Terms of Use.