The Community for Technology Leaders
Green Image
For more than a decade, Internet users have relied on digital certificates issued by certificate authorities to encrypt and authenticate their most valuable communications. Computer security experts have lambasted weaknesses in the system since its inception. Recent exploits have brought several problems back into stark focus. The authors describe some proposed technology-based improvements, as well as some legal, economic, and organizational shortcomings of the trust model. They also propose first steps toward fixes and next steps for study.
Blogs, Internet, Privacy, Computational modeling, Cryptography, Authentication, Legal factors, Law, Public key cryptography, Computer security, Access control, public-key cryptosystems, public policy, legal implications
S. Schultze, S. B. Roosa, "Trust Darknet: Control and Compromise in the Internet's Certificate Authority Model", IEEE Internet Computing, vol. 17, no. , pp. 18-25, May-June 2013, doi:10.1109/MIC.2013.27
190 ms
(Ver 3.3 (11022016))