SKI: Security key infrastructure for a server audit certification

Takamasa Isohara, Yutaka Arakawa, Keisuke Takemori, Iwao Sasase

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

An authentication technology such as Public Key Infrastructure (PKI) is used for a server authentication. However, it does not certificate a status of a server side security countermeasures, e.g., a configuration and operating condition of a Firewall (FW), a Virus Detection System (VDS) and an Intrusion Detection System (IDS). When a client machine communicates the server that is vulnerable to the attack, the server may affect the critical damage to the client machine. In this paper, we propose a Security Key Infrastructure (SKI) scheme that verifies the server side security countermeasures by linkage between an external and an internal audit. We consider requirements for designs of the SKI scheme, and implement communication modules between the server and the client machine. It is shown that the proposed SKI can achieve a quick response of the server and provide the certification of the security countermeasures to the client machine.

Original languageEnglish
Title of host publication6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2005 - Proceedings
Pages350-355
Number of pages6
Volume2005
Publication statusPublished - 2005
Event6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2005 - Yangon, Myanmar
Duration: 2005 Nov 92005 Nov 10

Other

Other6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2005
CountryMyanmar
CityYangon
Period05/11/905/11/10

Fingerprint

Servers
Authentication
Computer viruses
Computer system firewalls
Intrusion detection
Communication

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Isohara, T., Arakawa, Y., Takemori, K., & Sasase, I. (2005). SKI: Security key infrastructure for a server audit certification. In 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2005 - Proceedings (Vol. 2005, pp. 350-355). [1593490]

SKI : Security key infrastructure for a server audit certification. / Isohara, Takamasa; Arakawa, Yutaka; Takemori, Keisuke; Sasase, Iwao.

6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2005 - Proceedings. Vol. 2005 2005. p. 350-355 1593490.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Isohara, T, Arakawa, Y, Takemori, K & Sasase, I 2005, SKI: Security key infrastructure for a server audit certification. in 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2005 - Proceedings. vol. 2005, 1593490, pp. 350-355, 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2005, Yangon, Myanmar, 05/11/9.
Isohara T, Arakawa Y, Takemori K, Sasase I. SKI: Security key infrastructure for a server audit certification. In 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2005 - Proceedings. Vol. 2005. 2005. p. 350-355. 1593490
Isohara, Takamasa ; Arakawa, Yutaka ; Takemori, Keisuke ; Sasase, Iwao. / SKI : Security key infrastructure for a server audit certification. 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2005 - Proceedings. Vol. 2005 2005. pp. 350-355
@inproceedings{f8cad719197e40f1933d6f2b202a6909,
title = "SKI: Security key infrastructure for a server audit certification",
abstract = "An authentication technology such as Public Key Infrastructure (PKI) is used for a server authentication. However, it does not certificate a status of a server side security countermeasures, e.g., a configuration and operating condition of a Firewall (FW), a Virus Detection System (VDS) and an Intrusion Detection System (IDS). When a client machine communicates the server that is vulnerable to the attack, the server may affect the critical damage to the client machine. In this paper, we propose a Security Key Infrastructure (SKI) scheme that verifies the server side security countermeasures by linkage between an external and an internal audit. We consider requirements for designs of the SKI scheme, and implement communication modules between the server and the client machine. It is shown that the proposed SKI can achieve a quick response of the server and provide the certification of the security countermeasures to the client machine.",
author = "Takamasa Isohara and Yutaka Arakawa and Keisuke Takemori and Iwao Sasase",
year = "2005",
language = "English",
isbn = "4885522161",
volume = "2005",
pages = "350--355",
booktitle = "6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2005 - Proceedings",

}

TY - GEN

T1 - SKI

T2 - Security key infrastructure for a server audit certification

AU - Isohara, Takamasa

AU - Arakawa, Yutaka

AU - Takemori, Keisuke

AU - Sasase, Iwao

PY - 2005

Y1 - 2005

N2 - An authentication technology such as Public Key Infrastructure (PKI) is used for a server authentication. However, it does not certificate a status of a server side security countermeasures, e.g., a configuration and operating condition of a Firewall (FW), a Virus Detection System (VDS) and an Intrusion Detection System (IDS). When a client machine communicates the server that is vulnerable to the attack, the server may affect the critical damage to the client machine. In this paper, we propose a Security Key Infrastructure (SKI) scheme that verifies the server side security countermeasures by linkage between an external and an internal audit. We consider requirements for designs of the SKI scheme, and implement communication modules between the server and the client machine. It is shown that the proposed SKI can achieve a quick response of the server and provide the certification of the security countermeasures to the client machine.

AB - An authentication technology such as Public Key Infrastructure (PKI) is used for a server authentication. However, it does not certificate a status of a server side security countermeasures, e.g., a configuration and operating condition of a Firewall (FW), a Virus Detection System (VDS) and an Intrusion Detection System (IDS). When a client machine communicates the server that is vulnerable to the attack, the server may affect the critical damage to the client machine. In this paper, we propose a Security Key Infrastructure (SKI) scheme that verifies the server side security countermeasures by linkage between an external and an internal audit. We consider requirements for designs of the SKI scheme, and implement communication modules between the server and the client machine. It is shown that the proposed SKI can achieve a quick response of the server and provide the certification of the security countermeasures to the client machine.

UR - http://www.scopus.com/inward/record.url?scp=33847117735&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33847117735&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:33847117735

SN - 4885522161

SN - 9784885522161

VL - 2005

SP - 350

EP - 355

BT - 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2005 - Proceedings

ER -