80 likes | 223 Views
Rapid development in ICT makes the world a small village.E-services requires secure environment ? PKI.MUST consider the Cross Certification ? conveying Domain trust to other domains.In the next section ? explore some examples for Trust Models.. 2. Overview. Cross Recognition ? the will to trus
E N D
1. Crossing Over Under The Root
Presented by:
Sondos Makawy
2. Rapid development in ICT makes the world a small village.
E-services requires secure environment ? PKI.
MUST consider the Cross Certification ? conveying Domain trust to other domains.
In the next section ? explore some examples for Trust Models. 2 Overview because anyone can get almost anything from almost any where ? E-Services.
But these E-services requires a secure environment! ,which can be accommodated by the employing a PKI.
Its important to determine from the beginning the following:
What domains we might have?
upon which polices these domains will trust each others. because anyone can get almost anything from almost any where ? E-Services.
But these E-services requires a secure environment! ,which can be accommodated by the employing a PKI.
Its important to determine from the beginning the following:
What domains we might have?
upon which polices these domains will trust each others.
3. Cross Recognition ? the will to trust any/some certificates issued from the recognized (licensed) CAs.
Many trust models exist
Mesh.
Bridge.
Web model (Certificate Trust List).
Hierarchical (strict, loose). Existing Trust Models
4. Avoid the complexities that exist in some trust models
Such as the bridge.
Government not the private sector.
Cooperation required ? cannot be easily accommodated for the private sector.
Nature and conventions of the Sudan.
4 Considerations Milton Friedman said: "If you put the federal government in charge of the Sahara Desert, in 5 years there'd be a shortage of sand".
Milton Friedman said: "If you put the federal government in charge of the Sahara Desert, in 5 years there'd be a shortage of sand".
5. In the start we will adopt the Hierarchical Model.
Simple + Application support +Appropriate for the Sudanese system and culture).
We will also allow cross recognition with other trusted domain.
Intra-Domain cross certification will be allowed.
May be in the future ? to embed our certificate in the popular browsers. 5 What we Choose?
6. Proposed Model