Weitere Beispiele werden automatisch zu den Stichwörtern zugeordnet - wir garantieren ihre Korrektheit nicht.
There is already a process in place to handle compromised certificate authorities.
This process is best described in the page: Intermediate certificate authorities.
Several commercial firms, and a few government departments, have established such certificate authorities.
There have been several high profile public failures by assorted certificate authorities.
This risk can be partially but not completely reduced by having a hierarchy of multiple certificate authorities.
However, many certificate authorities continue to charge a premium for this kind of certificate.
There are also systems that move away from absolutely trusted certificate authorities in favor of consensus-based trust.
Using password-based authentication does not require reliance on certificate authorities.
As with root certificate authorities in general, browsers may not recognize all issuers.
But the far, far bigger question is about what will replace certificate authorities and rebuild a trust system on the web.
For enhanced security purposes, most end user certificates today are issued by intermediate certificate authorities.
Authenticode certificates can be obtained from certificate authorities trusted by Microsoft.
Historically, only organizations with very valuable secrets, such as certificate authorities, militaries, and governments, would make use of the technology.
The absolute trust given to certificate authorities, and the susceptibility of that trust to abuse, has long been considered a problem.
Digital certificates are issued by certificate authorities.
Hundreds of bodies - known as certificate authorities (CAs) - are allowed to provide such authentication.
You can obtain a digital signature from any of a number of certificate authorities - preferably a properly approved one.
Thawte is one of the root certificate authorities recognized by both Microsoft and Netscape.
They will also enable domain holders to assert certificates for themselves, without reference to third-party certificate authorities.
Spontaneous interactions would, therefore, require a single, or a few trusted certificate authorities (CAs).
However, these systems require care in endorsing the match between identity information and public keys by certificate authorities in order to work properly.
However, there is a problem with encryption: certificate authorities may not be as trustworthy as they should be.
The specific implementation requires a dedicated certificate server in one of four configurations as Certificate authorities.
The good news is that because your computer or iDevice already knows many of these certificate authorities, it can check signatures without the need for additional information.
(Note that most certificate authorities only check the e-mail address, not the name of the person requesting a certificate.)