Search citation statements
Paper Sections
Citation Types
Year Published
Publication Types
Relationship
Authors
Journals
It is essential to maintain a ratio between privacy protection and knowledge discovery. Internet users depend daily on SSL/HTPS for secure communication on internet. Over the years, many attacks on the certificate trust model it uses have been evolved. Mutual SSL authentication shared verification alludes to two parties validating each other through checking the digital certificate so that both sides are guaranteed of the other's identity. In technical terms, it alludes to a client (web program or client application) authenticate themselves to the server (server application) and that server likewise confirming itself to the client through checking the general public key certificate issued by trusted Certificate Authorities (CA). Since confirmation depends on computerized Certificate, certification authorities, for example, Verisign or Microsoft Declaration Server are a critical part of mutual authentication process. From an abnormal state perspective, the way toward authenticating and setting up an encrypted channel using certificate-based mutual SSL authentication.
It is essential to maintain a ratio between privacy protection and knowledge discovery. Internet users depend daily on SSL/HTPS for secure communication on internet. Over the years, many attacks on the certificate trust model it uses have been evolved. Mutual SSL authentication shared verification alludes to two parties validating each other through checking the digital certificate so that both sides are guaranteed of the other's identity. In technical terms, it alludes to a client (web program or client application) authenticate themselves to the server (server application) and that server likewise confirming itself to the client through checking the general public key certificate issued by trusted Certificate Authorities (CA). Since confirmation depends on computerized Certificate, certification authorities, for example, Verisign or Microsoft Declaration Server are a critical part of mutual authentication process. From an abnormal state perspective, the way toward authenticating and setting up an encrypted channel using certificate-based mutual SSL authentication.
Now-a-days many people do multiple activities, transactions in fields such as finance, banking, business sector etc over internet. These activities, transaction should be secure. Providing security and authorization control has became the major concern in the globalization of internet. We are inspired by the need and urgency to handle the present situations and to put forward a strong authorization methodology in the globalization of web environment. Public Key Infrastructure which we are using now is meant to provide strong authentication by the use of digital certificates. In this paper we introduce a new technology of Privileged Management Infrastructure which provides strong authorization by the use of attribute certificates. Also in order to introduce attribute certificate we primarily need to check the genuineness of SSL digital certificate i.e. whether the SSL digital certificate is genuine or it's a fake certificate.
Computer security has become one of the most important concerns in the entire discipline of computing. The recent explosive growth of the Internet and the World Wide Web has brought with it a need to protect sensitive communications over the open networks. In the past, security violations were generally done by Young adults, just for fun. But as technology and usage of internet increased, there is always the threat of planned attack (cyber terrorists), where the loss of money could be large in billions, Hence the need for secure connection will arise. A Robust solution for this is provided by VPN (Virtual Private Networks) and SSL (Secure Socket Layer) protocols in my research .In the recent past SSL protocol has revolutionized the area of VPN (Virtual Private Network). To set up secure communication from virtually any Internet-connected web browser, SSL based VPN products permit users to do such a thing. To implement a secure remote access, It is easier and resourceful than its predecessor (IP Sec). In my research paper in which security of client -server communication is achieved by principles of security, like Authentication and Encryption. There are two side of this application server side and client side. Without certification, client can't communicate with the server. The SSL handshake-protocol message flow involves client and server negotiating a common cipher suite acceptable to both parties. The application based on RSA algorithm, using for encryption especially for data sent to server. A certificate is issued to each server and client using key tool commands. Private keys are protected by a password in key store. Client and server can thus communicate with each other only if the certificate has been issued to both. Once issued a secure and safe communication link is established. It gives an insight into the different attacks on the internet, and how the data can be sent securely through SSL.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.