Essays about: "PKI"

Showing result 1 - 5 of 38 essays containing the word PKI.

  1. 1. Design systems in the Public Key Infrastructure area : Usability, ethics, and impact

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jessica Lucchetta; [2022]
    Keywords : Design system; Ethical risks; Public key infrastructure; Design system; Etiska risker; Public key infrastructure;

    Abstract : This research was conducted in the field of public key infrastructures (PKI). This sector is highly confidential and deals with managing security through encryption. The products in this area are technical: the user interface and user experience aspects are not prioritized and they are usually ignored or downplayed. READ MORE

  2. 2. LF-PKI: Practical, Secure, and High-Performance Design and Implementation of a Lite Flexible PKI

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yongzhe Xu; [2022]
    Keywords : Web Public Key Infrastructure PKI ; Certificate Transparency CT ; trust heterogeneity; Sparse Merkle Tree SMT ; Web Public Key Infrastructure PKI ; Certificate Transparency CT ; trust heterogenity; Sparse Merkle Träd SMT ;

    Abstract : Today’s Web Public Key Infrastructure (PKI) builds on a homogeneous trust model. All Certificate Authorities (CAs) are equally trusted once they are marked as trusted CAs on the client side. As a result, the security of the Web PKI depends on the weakest CA. READ MORE

  3. 3. Studying the Opportunities of Blockchain Implementations in Electronic Transactions compared to the eIDAS Regulations

    University essay from KTH/Industriell ekonomi och organisation (Inst.)

    Author : Hanna Hansson; [2022]
    Keywords : Blockchain; blockchain technology; eIDAS; eIDAS regulation; eID; electronic identification; PKI; public key infrastructure; trusted service provider; distributed ledgers; SSI; self-sovereign identity; Blockchain; blockchain teknologi; eIDAS; eIDAS regulationen; eID; elektronisk identifikation; PKI; distribuerad databaseteknik; SSI;

    Abstract : The electronic identification regulation, eIDAS, and its trusted service providers are currently based on technologies that have been used for decades. The eIDAS and many others in the security industry have shown interest in newer technologies such as distributed ledgers and blockchain. READ MORE

  4. 4. Secure microservices communication between heterogeneous service meshes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zara Wajid Butt; [2022]
    Keywords : Service Mesh; Istio; Consul; Federation; Kubernetes; PKI; mTLS; Service Mesh; Istio; Consul; Federation; Kubernetes; PKI; mTLS;

    Abstract : Microservice architecture is an emerging paradigm that has been unceasingly adopted by large organizations to develop flexible, agile, and distributed applications. This architecture involves breaking a large monolithic application into multiple services that can be deployed and scaled autonomously. READ MORE

  5. 5. Longitudinal analysis of the certificate chains of big tech company domains

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Sebastian Klasson; Nina Lindström; [2021]
    Keywords : certificate authorities; CA; certificate chains; certificates; certificate validation; HTTPS; network security; internet security; PKI; Project Sonar; SSL; TLS; X.509;

    Abstract : The internet is one of the most widely used mediums for communication in modern society and it has become an everyday necessity for many. It is therefore of utmost importance that it remains as secure as possible. SSL and TLS are the backbones of internet security and an integral part of these technologies are the certificates used. READ MORE