In Log We Trust: Revealing Poor Security Practices with Certificate Transparency Logs and Internet Measurements.
Oliver GasserBenjamin HofMax HelmMaciej KorczynskiRalph HolzGeorg CarlePublished in: PAM (2018)
Keyphrases
- public key infrastructure
- security mechanisms
- internet banking
- electronic payment
- security issues
- security threats
- enterprise network
- trust relationships
- security services
- security requirements
- access control
- online banking
- log analysis
- log files
- information security
- authentication mechanism
- trust management
- trusted computing
- digital signature
- public key cryptography
- network security
- policy enforcement
- public key
- security policies
- trust model
- security analysis
- security protocols
- public key encryption
- factor authentication
- trust negotiation
- resource constrained
- privacy concerns
- computer networks
- smart card
- electronic commerce
- intrusion detection
- virtual teams
- data integrity
- log data
- personal information
- consumer trust
- brokerage services
- cloud computing
- case study