摘要 :
Several mechanisms have been proposed for disseminating information regarding the status of a digital certificate, each one with its own advantages and disadvantages. We believe that what is still missing from such mechanisms is t...
展开
Several mechanisms have been proposed for disseminating information regarding the status of a digital certificate, each one with its own advantages and disadvantages. We believe that what is still missing from such mechanisms is transparency. A user should not need to comprehend the mechanics of such mechanisms in order to verify a certificate. In this paper, we present a mechanism called Alternative mechanism for the Dissemination of Certificate Status Information that supports transparency in disseminating Certificate Status Information.
收起
摘要 :
A wide spectrum of certificate revocation mechanisms is currently in use. A number of them have been proposed by standardisation bodies, while some others have originated from academic or private institutions. What is still missin...
展开
A wide spectrum of certificate revocation mechanisms is currently in use. A number of them have been proposed by standardisation bodies, while some others have originated from academic or private institutions. What is still missing is a systematic and robust framework for the sound evaluation of these mechanisms. We present a mechanism-neutral framework for the evaluation of certificate status information (CSI) mechanisms. These mechanisms collect, process and distribute CSI. A detailed demonstration of its exploitation is also provided. The demonstration is mainly based on the evaluation of Certificate Revocation Lists, as well as of the Online Certificate Status Protocol. Other well-known CSI mechanisms are also mentioned for completeness.
收起
摘要 :
The conventional public key infrastructure (PKI) model, which powers most of the Internet, suffers from an excess of trust into certificate authorities (CAs), compounded by a lack of transparency which makes it vulnerable to hard-...
展开
The conventional public key infrastructure (PKI) model, which powers most of the Internet, suffers from an excess of trust into certificate authorities (CAs), compounded by a lack of transparency which makes it vulnerable to hard-to-detect targeted stealth impersonation attacks. Existing approaches to make certificate issuance more transparent, including ones based on blockchains, are still somewhat centralized. We present decentralized PKI transparency (DPKIT): a decentralized client-based approach to enforcing transparency in certificate issuance and revocation while eliminating single points of failure. DPKIT efficiently leverages an existing blockchain to realize an append-only, distributed associative array, which allows anyone (or their browser) to audit and update the history of all publicly issued certificates and revocations for any domain. Our technical contributions include definitions for append-only associative ledgers, a security model for certificate transparency, and a formal analysis of our DPKIT construction with respect to the same. Intended as a client-side browser extension, DPKIT will be effective at fraud detection and prosecution, even under fledgling user adoption, and with better coverage and privacy than federated observatories, such as Google’s or the Electronic Frontier Foundation’s.
收起
摘要 :
A mobile ad hoc network (known as MANET) represents a wireless communication network, without a pre-existent subtraction or foundation and which is not reliant on any kind of centralized management. Various certificate authorities...
展开
A mobile ad hoc network (known as MANET) represents a wireless communication network, without a pre-existent subtraction or foundation and which is not reliant on any kind of centralized management. Various certificate authorities (CAs) distributed over the network, each with a periodically updated share of the secret key, is usually adopted. With this paper we hope to bring a strong contribution to making the public key management scheme more efficient especially for fully self-organized mobile ad hoc networks where the role of the dealer is played by all the nodes play. To ensure this means that each node must carry out by itself all the operations that imply nodes' public keys: initiation, distribution and revocation. The main objective of our approach is to enhance the process of building fully self certificate authority of nodes by using the Ham-line strong (n, t, n) VSS. Our proposal will provide the mobile ad hoc network flexible and efficient to make renewal and revoke certificate authority.
收起
摘要 :
The Office of Special Education Programs funded Center to Inform Personnel Preparation Policy and Practice in Early Intervention and Preschool Education conducted a study to obtain current information about state certification req...
展开
The Office of Special Education Programs funded Center to Inform Personnel Preparation Policy and Practice in Early Intervention and Preschool Education conducted a study to obtain current information about state certification requirements for early childhood special educators who 'work with preschool children with developmental delays and disabilities. Data -were collected via Web searches and interviews. Part B 619 and other agency representatives provided information regarding the state's certification model, the rationale for developing that model, and certification content. Results indicated great variation in certification requirements across states and limited adherence to recommendations of professional associations.
收起
摘要 :
The Office of Special Education Programs funded Center to Inform Personnel Preparation Policy and Practice in Early Intervention and Preschool Education conducted a study to obtain current information about state certification req...
展开
The Office of Special Education Programs funded Center to Inform Personnel Preparation Policy and Practice in Early Intervention and Preschool Education conducted a study to obtain current information about state certification requirements for early childhood special educators who 'work with preschool children with developmental delays and disabilities. Data -were collected via Web searches and interviews. Part B 619 and other agency representatives provided information regarding the state's certification model, the rationale for developing that model, and certification content. Results indicated great variation in certification requirements across states and limited adherence to recommendations of professional associations.
收起
摘要 :
Security threats are most common in e-commerce and e-business transactions. Public key infrastructure (PKI) is a framework on which the security services are established. It can provide various secure services in e-commerce and e-...
展开
Security threats are most common in e-commerce and e-business transactions. Public key infrastructure (PKI) is a framework on which the security services are established. It can provide various secure services in e-commerce and e-business transactions by providing a comprehensive infrastructure for issuing and managing public keys in the form of digital certificates to a set of users. During acquisition of companies, the multiple PKIs deployed by them must be interoperated. Hierarchical PKI is one of the most popular PKI trust models that the companies deploy as their security infrastructure. Considering the specialties of such context, an efficient scheme to merge hierarchical PKIs during acquisition of companies is proposed. The proposed merging process is simple, fast and low cost. Compared with the common ways of merging PKIs with cross-certification at the root, the certificate verification in new PKI is more efficient and straightforward. Also the employment cost of root certification authorities is reduced. In the proposed method, there is no cross-certification at the root and so certificate verification time reduces significantly as compared to the normal method of merging with cross-certification.
收起
摘要 :
As professionals, we have many opportunities to prove our expertise in our field. Professional Certification is one of those opportunities. Certified nurses have reported feeling more empowered, with better collaborative relations...
展开
As professionals, we have many opportunities to prove our expertise in our field. Professional Certification is one of those opportunities. Certified nurses have reported feeling more empowered, with better collaborative relationships, as well as believing that they provide better care. Nurses also have perceived intrinsic value to obtaining certification in a specialty practice area. The certification process attempts to demonstrate that the nurse has exceeded the minimal standards and exhibits a high level of competence over the subject area. Leaders should continue to encourage their team members to obtain professional certification in their specialty areas of practice.
收起
摘要 :
Errors in death certification can directly affect the decedent's survivors and the public register. We assessed the effectiveness of an educational seminar targeting frequent and important errors identified by local death certific...
展开
Errors in death certification can directly affect the decedent's survivors and the public register. We assessed the effectiveness of an educational seminar targeting frequent and important errors identified by local death certificate (DC) evaluation. Retrospective review of 1500 DCs categorized errors and physician specialty. A 60-minute didactic/case-based seminar was subsequently designed for family medicine physician (FAM) participants, with administration of presurvey, immediate post, and 2-month postsurveys. Most DCs were completed by FAM (73%), followed by internists (18%) and surgeons (3%). Error occurrence (EO) rate ranged between 32 and 75% across all specialities. Family medicine physician experienced in palliative care had the lowest EO rate (32%), significantly lower (P < 0.001) than FAM without interest in palliative care (62%), internal medicine (62%), and surgery (75%). Common errors were use of abbreviations (26%), mechanism as underlying cause of death (23%), and no underlying cause of death recorded (22%). Presurvey participants (n = 72) had an overall EO rate of 72% (64% excluding formatting errors). Immediate postsurvey (n = 75) and 2-month postsurvey (n = 24) participants demonstrated significantly lower overall EO (34% and 24%, respectively), compared with the Pre-S (P < 0.05). A 60-minute seminar on death certification reduced EO rate with perceived long-term effects.
收起
摘要 :
Industry certification is a veritable juggernaut driven by several dynamics: candidates seeking to boost knowledge, skills, status, and remuneration; the industry and professional associations seeking to set minimum standards, and...
展开
Industry certification is a veritable juggernaut driven by several dynamics: candidates seeking to boost knowledge, skills, status, and remuneration; the industry and professional associations seeking to set minimum standards, and raise the bar of competency levels; employers seeking ways to better qualify job candidates; consumers demanding knowledgeable and skilled professionals; and product vendors demanding highly competent technicians implement and support their products. Academic institutions are integrating industry certification in their curricula. A certification for the SoDIS (Software Development Impact Statements) methodology of ethics-based risk assessment has been mooted.
收起