Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Free access

Certificate transparency

Published: 23 September 2014 Publication History

Abstract

Public, verifiable, append-only logs.

References

[1]
Comodo Group. Mar. 31, 2011 update; https://www.comodo.com/Comodo-Fraud-Incident-2011-03-23.html.
[2]
Langley, A. Enhancing digital certificate security. Google Online Security Blog, 2013; http://googleonlinesecurity.blogspot.de/2013/01/enhancingdigital-certificate-security.html.
[3]
Langley, A. Further improving digital certificate security. Google Online Security Blog, 2013; http://googleonlinesecurity.blogspot.co.uk/2013/12/further-improving-digital-certificate.html.
[4]
Laurie, B. Improving SSL certificate security. Google Online Security Blog, 2011; http://googleonlinesecurity.blogspot.co.uk/2011/04/improving-ssl-certificate-security.html.

Cited By

View all
  • (2024)Algorithm for Key Transparency with Transparent LogsOpen Research Europe10.12688/openreseurope.18200.24(163)Online publication date: 2-Oct-2024
  • (2024)Algorithm for Key Transparency with Transparent LogsOpen Research Europe10.12688/openreseurope.18200.14(163)Online publication date: 5-Aug-2024
  • (2024)Service Provider Accreditation: Enabling and Enforcing Privacy-by-Design in Credential-based Authentication SystemsProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3669934(1-11)Online publication date: 30-Jul-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 57, Issue 10
October 2014
99 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/2661061
  • Editor:
  • Moshe Y. Vardi
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 September 2014
Published in CACM Volume 57, Issue 10

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Popular
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)663
  • Downloads (Last 6 weeks)111
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Algorithm for Key Transparency with Transparent LogsOpen Research Europe10.12688/openreseurope.18200.24(163)Online publication date: 2-Oct-2024
  • (2024)Algorithm for Key Transparency with Transparent LogsOpen Research Europe10.12688/openreseurope.18200.14(163)Online publication date: 5-Aug-2024
  • (2024)Service Provider Accreditation: Enabling and Enforcing Privacy-by-Design in Credential-based Authentication SystemsProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3669934(1-11)Online publication date: 30-Jul-2024
  • (2024)Poisoning Web-Scale Training Datasets is Practical2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00179(407-425)Online publication date: 19-May-2024
  • (2024)Attacking and Improving the Tor Directory Protocol2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00083(3221-3237)Online publication date: 19-May-2024
  • (2024)Lightweight Verifiable Privacy-Preserving Data Aggregation for Smart GridsIEEE Internet of Things Journal10.1109/JIOT.2024.341916111:19(31249-31259)Online publication date: 1-Oct-2024
  • (2024)Decentralized PKI Framework for Data Integrity in Spatial Crowdsourcing Drone Services2024 IEEE International Conference on Web Services (ICWS)10.1109/ICWS62655.2024.00084(643-653)Online publication date: 7-Jul-2024
  • (2024)Append-Only Authenticated Data Sets Based on RSA AccumulatorData Security and Privacy Protection10.1007/978-981-97-8546-9_8(140-155)Online publication date: 18-Oct-2024
  • (2023)TAPProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620600(6489-6506)Online publication date: 9-Aug-2023
  • (2023)VeriAnon: an Anonymous, Verifiable, and Tamper-proof Commenting System Based on Ring Signature and Clustering Merkle Tree for Decentralized TradingProceedings of the 2023 4th Asia Service Sciences and Software Engineering Conference10.1145/3634814.3634833(132-140)Online publication date: 27-Oct-2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDFChinese translation

eReader

View online with eReader.

eReader

Digital Edition

View this article in digital edition.

Digital Edition

Magazine Site

View this article on the magazine site (external)

Magazine Site

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media