TY - GEN
T1 - SKI
T2 - 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2005
AU - Isohara, Takamasa
AU - Arakawa, Yutaka
AU - Takemori, Keisuke
AU - Sasase, Iwao
PY - 2005/12/1
Y1 - 2005/12/1
N2 - An authentication technology such as Public Key Infrastructure (PKI) is used for a server authentication. However, it does not certificate a status of a server side security countermeasures, e.g., a configuration and operating condition of a Firewall (FW), a Virus Detection System (VDS) and an Intrusion Detection System (IDS). When a client machine communicates the server that is vulnerable to the attack, the server may affect the critical damage to the client machine. In this paper, we propose a Security Key Infrastructure (SKI) scheme that verifies the server side security countermeasures by linkage between an external and an internal audit. We consider requirements for designs of the SKI scheme, and implement communication modules between the server and the client machine. It is shown that the proposed SKI can achieve a quick response of the server and provide the certification of the security countermeasures to the client machine.
AB - An authentication technology such as Public Key Infrastructure (PKI) is used for a server authentication. However, it does not certificate a status of a server side security countermeasures, e.g., a configuration and operating condition of a Firewall (FW), a Virus Detection System (VDS) and an Intrusion Detection System (IDS). When a client machine communicates the server that is vulnerable to the attack, the server may affect the critical damage to the client machine. In this paper, we propose a Security Key Infrastructure (SKI) scheme that verifies the server side security countermeasures by linkage between an external and an internal audit. We consider requirements for designs of the SKI scheme, and implement communication modules between the server and the client machine. It is shown that the proposed SKI can achieve a quick response of the server and provide the certification of the security countermeasures to the client machine.
UR - http://www.scopus.com/inward/record.url?scp=33847117735&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33847117735&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:33847117735
SN - 4885522161
SN - 9784885522161
T3 - 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2005 - Proceedings
SP - 350
EP - 355
BT - 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2005 - Proceedings
Y2 - 9 November 2005 through 10 November 2005
ER -