1 / 8

Crossing Over Under The Root

Rapid development in ICT makes the world a small village.E-services requires secure environment ? PKI.MUST consider the Cross Certification ? conveying Domain trust to other domains.In the next section ? explore some examples for Trust Models.. 2. Overview. Cross Recognition ? the will to trus

sue
Télécharger la présentation

Crossing Over Under The Root

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. Crossing Over Under The Root Presented by: Sondos Makawy

    2. Rapid development in ICT makes the world a small village. E-services requires secure environment ? PKI. MUST consider the Cross Certification ? conveying Domain trust to other domains. In the next section ? explore some examples for Trust Models. 2 Overview because anyone can get almost anything from almost any where ? E-Services. But these E-services requires a secure environment! ,which can be accommodated by the employing a PKI. Its important to determine from the beginning the following: What domains we might have? upon which polices these domains will trust each others. because anyone can get almost anything from almost any where ? E-Services. But these E-services requires a secure environment! ,which can be accommodated by the employing a PKI. Its important to determine from the beginning the following: What domains we might have? upon which polices these domains will trust each others.

    3. Cross Recognition ? the will to trust any/some certificates issued from the recognized (licensed) CAs. Many trust models exist Mesh. Bridge. Web model (Certificate Trust List). Hierarchical (strict, loose). Existing Trust Models

    4. Avoid the complexities that exist in some trust models Such as the bridge. Government not the private sector. Cooperation required ? cannot be easily accommodated for the private sector. Nature and conventions of the Sudan. 4 Considerations Milton Friedman said: "If you put the federal government in charge of the Sahara Desert, in 5 years there'd be a shortage of sand". Milton Friedman said: "If you put the federal government in charge of the Sahara Desert, in 5 years there'd be a shortage of sand".

    5. In the start we will adopt the Hierarchical Model. Simple + Application support +Appropriate for the Sudanese system and culture). We will also allow cross recognition with other trusted domain. Intra-Domain cross certification will be allowed. May be in the future ? to embed our certificate in the popular browsers. 5 What we Choose?

    6. Proposed Model

More Related