Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
Marcapada: Jurnal Kebijakan Pertanahan
An electronic certificate (Sertipikat-el) results from a series of electronic land registration activities in electronic documents that should be digital evidence. This paper describes the infrastructure of Sertipikat-el and offers steps that can be taken so that Sertipikat-el does not lose its essence as evidence of ownership and not ruled out in evidence at trial. Sertipikat-el in electronic documents does not violate the laws and regulations. Unfortunately, the electronic system used to create and manage Sertipikat-el does not meet all requirements so that it can guarantee that each component and the integration of all electronic systems continue to operate properly by minimizing the failure of electronic systems. Although Sertipikat-el has been determined in electronic documents, it has not been further regulated regarding data input and information. For this reason, there is a need for a complete revision of ministerial regulations and implementation related to electronic la...
2014
SERTIT, the Norwegian Cert if ication Author ity for IT Sec ur ity, is a member of the above Arrangement and as such this conf irms that the Common Criteria cert if icate has been issued by or under the authority of a Party to this Arrangement and is the Party’s cla im that the cert if icate has been issued in accordance with the terms of this Arrangement The judgements contained in the cert if icate and Cert if ication Report are those of SERTIT which issued it and the Norwegian evaluation facil ity (EVIT) which carried out the evaluation. There is no impl ication of acceptance by other Members of the Agreement Group of l iabil ity in respect of those judgements or for loss sustained as a result of rel iance placed upon those judgements by a third party. * * Mutual Recognit ion under the CC recognit ion arrangement appl ies to EAL4.
This paper describes a Generic Light Weight Certificate Management Protocol (GLCMP) for handling certificates on mobile devices. Theoretically, various security solutions are designed to protect the valuable information of mobile users. But, its power, memory and processing constraints, high response time and authentication latencies are the main challenges for the researcher to develop and integrate standard security mechanisms in it. It is observed that, most of mobile users are not technical enough to configure security parameters and even already developed libraries do not support extended security features like transparent handling of certificates, verification of identities, and distribution of certificates. In this paper, an innovative and comparatively efficient protocol is designed and implemented. It does not only overcome the shortcoming of the certificate handling in mobile devices but also provides some extended certificate related features like registration, authentication and trust delegation. The designed GLCMP is lightweight because all complex and computation-intensive operations, involved in creation of certificate request in PKCS#10 standard format, are offloaded to a proxy server. It also provides domain based secure registration and verification of the identities without exchanging any confidential information to the proxy servers and even no user’s credential is exchanged on network for authentication. After analyzing its performance, we noticed that authentication latency of GLCMP is 0.394 sec which is less than previously proposed protocols like NSI (4.7), PKI (5.01), and PKASSO (5.19 delegation time + 0.082 authentication times). We also formally verified our designed by using Z-Notation Modeling techniques and found that it is protected against man-in-the-middle, replay and impersonation and non-repudiation attacks. https://sites.google.com/site/ijcsis/
The certificate generation system is flexible for generating the mark - sheets of the students. This system is mainly based in th e database technology and the credit based grading system (CBGS). The system is targeted to various enterprises, schools, colle ges and universities. The development of system focuses at describing the tables with columns/rows & sub - columns, sub - rows, rules of data selection for calculating credits and grades of the students & summarizing exam data, particular table, column/row and formatting the data in destination document. Certificate generation system can be used in universities to automate the distribution of digitally verifiable mark - sheets of students. The system accesses the students exam information from the university database and generates the gadget - sheet and mark - sheets of all the students in a portable document format which provides authenticity of the document and can be verified easily.
IEEE Transactions on Dependable and Secure Computing, 2020
The Transport Layer Security (TLS) protocol aims to provide confidentiality and integrity of data. It is based on X.509 Certificates. Our previous research showed that popular Web Browsers exhibit non-standardized behaviour with respect to the certificate validation process [1]. This paper extends that work by examining their handling of OCSP Stapling. We also examine several popular HTTPS interception products, including proxies and anti-virus tools, regarding their certificate validation processes. We analyse and compare their behaviour to that described in the relative standards. Finally, we propose a system that allows the automation of certificate validation tests.
2019
In the earliest modern-age descriptions of Lucania emerge feelings close to an ante litteram Burkian delightful horror where out-of-reach mountains, impervious woods and gloomy marshes make up the recurring descriptive programme of lands «as toilsome and unpleasant as a basilisk. And perhaps they received their name from their ruggedness and crookedness», as Leandro Alberti noted in 1550. His reference to the mythologic figure of the reptile, capable of killing people just by looking at them, brews in the impressions of Nineteenth-century travellers who go beyond the picturesque and the antique and translate the seducing horror of such places of wretchedness and death into an inner experience of the landscape, “an analytic insight into the Sublime” where Nature prevails over man and his every action. In this Kantian line converge the travel notes of all Nineteenth-century travellers and artists, unanimously creating an invisible academy of the Sublime accrued by the tremendous magnificence of the landscape.
Explicação: Leia as proposituras que seguem e responda a opção correta. Depois deverá ser justificado-fundamentada por que escolheu sua opção como correta e também explicar por que as outras estão erradas.
Moving Across Borders: Foreign Relations, Religion and Cultural Interactions in the Ancient Mediterranean, Orientalia Lovaniensia Analecta 159, Louvain, Peeters Publishers, pp. 71-100, 2007
Jurnal Manajemen Bisnis dan Kewirausahaan, 2019
"Studi storici siciliani", anno III, n. 3, settembre 2023, pp. 8-21
Sociology Compass, 2008
JURNAL PENGABDIAN KEPADA MASYARAKAT, 2019
International journal of linguistics, literature and culture, 2019
BioMed Research International, 2018
Journal of Community Service and Society Empowerment, 2023
Journal of historical studies, 2020
Journal of Research in Health Sciences, 2018