A Distributed Reputation System for Certification Authority Trust Management

Author(s):  
Jiska Classen ◽  
Johannes Braun ◽  
Florian Volk ◽  
Matthias Hollick ◽  
Johannes Buchmann ◽  
...  
2017 ◽  
Vol 2017 ◽  
pp. 1-23 ◽  
Author(s):  
Ahmad Samer Wazan ◽  
Romain Laborde ◽  
David W. Chadwick ◽  
Francois Barrere ◽  
Abdelmalek Benzekri ◽  
...  

A Public Key Infrastructure (PKI) is considered one of the most important techniques used to propagate trust in authentication over the Internet. This technology is based on a trust model defined by the original X.509 (1988) standard and is composed of three entities: the certification authority (CA), the certificate holder (or subject), and the Relying Party (RP). The CA plays the role of a trusted third party between the certificate holder and the RP. In many use cases, this trust model has worked successfully. However, we argue that the application of this model on the Internet implies that web users need to depend on almost anyone in the world in order to use PKI technology. Thus, we believe that the current TLS system is not fit for purpose and must be revisited as a whole. In response, the latest draft edition of X.509 has proposed a new trust model by adding new entity called the Trust Broker (TB). In this paper, we present an implementation approach that a Trust Broker could follow in order to give RPs trust information about a CA by assessing the quality of its issued certificates. This is related to the quality of the CA’s policies and procedures and its commitment to them. Finally, we present our Trust Broker implementation that demonstrates how RPs can make informed decisions about certificate holders in the context of the global web, without requiring large processing resources themselves.


Author(s):  
Tomasz Ciszkowski ◽  
Zbigniew Kotulski

The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) significant researchers’ attention, due to its innate capabilities of instant communication in many time and mission critical applications. However, its natural advantages of networking in civilian and military environments make it vulnerable to security threats. Support for anonymity in MANET is orthogonal to a critical security challenge we faced in this chapter. We propose a new anonymous authentication protocol for mobile ad hoc networks enhanced with a distributed reputation system. The main objective is to provide mechanisms concealing a real identity of communicating nodes with an ability of resistance to known attacks. The distributed reputation system is incorporated for a trust management and malicious behaviour detection in the network.


2009 ◽  
Vol 4 (2) ◽  
pp. 2-8 ◽  
Author(s):  
Wiesław Maria Grudzewski ◽  
Irena Krystyna Hejduk ◽  
Anna Sankowska

2005 ◽  
Author(s):  
Lalana Kagal ◽  
Jeffrey Undercoffer ◽  
Filip Perich ◽  
Anupam Joshi ◽  
Tim Finin

Sign in / Sign up

Export Citation Format

Share Document