Leak in trusted root certificates management and the method for solving
The certificates trusted model and trusted root certificates management of current PKI system were analysed. A leak in the trusted root certificates management was pointed out. Further, the wrong trusting and information leak caused by certificates replacement were analyzed. Finally, the trusted roo...
Saved in:
Main Authors: | ZHU Guo-dong, NING Hong-zhou, HE De-quan |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2005-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74668587/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Automated Fog Node Audit and Certification Scheme With Multiple Attestation Certificate Authorities
by: Shuaib Anath, et al.
Published: (2025-01-01) -
Scheme of Attribute-Based Disclosure Mobile Trust Negotiation
by: Qiuyun Wang, et al.
Published: (2013-10-01) -
Interrogating the global application of e-certification of seafarers
by: Margie Mendoza Mataac, et al.
Published: (2025-01-01) -
Certification of mathematics teachers and its perspective
by: Eugenijus Stankus, et al.
Published: (2023-09-01) -
New extension method of trusted certificate chain in virtual platform environment
by: Liang TAN, et al.
Published: (2018-06-01)