ADoCSI: towards a transparent mechanism for disseminating Certificate Status Information

Several mechanisms have been proposed for disseminating information regarding the status of a digital certificate, each one with its own advantages and disadvantages. We believe that what is still missing from such mechanisms is transparency. A user should not need to comprehend the mechanics of such mechanisms in order to verify a certificate. In this paper, we present a mechanism called Alternative mechanism for the Dissemination of Certificate Status Information that supports transparency in disseminating Certificate Status Information.

[1]  Li Gong,et al.  Signing, Sealing, and Guarding Java Objects , 1998, Mobile Agents and Security.

[2]  Charles J. Petrie What's An Agent ... And What's So Intelligent About It? , 1997, IEEE Internet Computing.

[3]  Russ Housley,et al.  Internet X.509 Public Key Infrastructure Certificate and CRL Profile , 1999, RFC.

[4]  Marcel E. M. Spruit,et al.  IT security in Dutch practice , 1996, Comput. Secur..

[5]  Diomidis Spinellis,et al.  Evaluating certificate status information mechanisms , 2000, CCS.

[6]  Stuart G. Stubblebine,et al.  Recent-secure authentication: enforcing revocation in distributed systems , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.

[7]  Michael R. Genesereth,et al.  Software agents , 1994, CACM.

[8]  George C. Necula,et al.  Compiling with proofs , 1998 .

[9]  Moni Naor,et al.  Certificate revocation and certificate update , 1998, IEEE Journal on Selected Areas in Communications.

[10]  Diomidis Spinellis,et al.  A Taxonomy of Certificate Status Information Mechanisms , 2000 .

[11]  M. R. Genesereth,et al.  Knowledge Interchange Format Version 3.0 Reference Manual , 1992, LICS 1992.

[12]  Stefanos Gritzalis,et al.  Addressing security issues in programming languages for mobile code , 1998, Proceedings Ninth International Workshop on Database and Expert Systems Applications (Cat. No.98EX130).

[13]  Dieter Gollmann,et al.  Computer Security , 1979, Lecture Notes in Computer Science.

[14]  X. N. Zhang Secure Code Distribution , 1997, Computer.

[15]  Barbara Fox,et al.  Certificate Recocation: Mechanics and Meaning , 1998, Financial Cryptography.

[16]  Timothy W. Finin,et al.  A Proposal for a new KQML Specification , 1997 .

[17]  Uwe Georg Wilhelm,et al.  A TECHNICAL APPROACH TO PRIVACY BASED ON MOBILE AGENTS PROTECTED BY TAMPER-RESISTANT HARDWARE , 1999 .

[18]  Diomidis Spinellis,et al.  Addressing Threats and Security Issues in World Wide Web Technology , 1997 .