[SS17] IITM / Certificates in the Chain

Justus Fries, IITM series, Fri, 2017-07-07 14:15 .
advisor: Heiko Niedermayer
1 | 2 | 36 | ∑ 62
We are hiring! If you are interested to work on the technology behind the media portal, please contact us!
Abstract: The Transport Layer Security Protocol in its current implementation is based on a centralized and intransparent infrastructure. These flaws have been the cause of many Man-in-the-middle attacks, which are most commonly rooted in a lack of security in Certificate Authorities, who as a result get compromised. Log-based enhancements, such as Certificate Transparency, have made an effort to solve these problems by logging every signed certificate and thus making signing a public process. However these systems lack proper financial incentives and automation. In this seminar paper IKP, a system to add financial incentives, among other features, to Log-based enhancements and PKI, is described and discussed.
You currently don't have access to this video!
Anyway you can send the owner an email to request access by clicking here.
..or try to log in to gain access.

[] / []

, series,
You can't view this video since the owner hasn't set any rights yet.
You can remind him to do so by using the formular at the video's page.
You don't have access to a video marked with a lock symbol because of the owner's access restriction.
Try to login to gain access, or contact the owner using the formular at the video's page.
The symbol in the upper left corner hints to the access level of the video.
Its actual meaning can be found in the tooltip that opens when hovering the video.
The stars in the lower right corner indicate the rating of the users for this video.
They represent a common star rating ranging from one to five stars.
Any user that has view access can rate a video on its detail view.
The date in the lower left corner represents the record date of the video.
A more detailed version containing the actual speaking time can be found in the tooltip.
(0.21 s) | Impressum | Griffon