翻訳と辞書
Words near each other
・ Certified First Responder in France
・ Certified for Microsoft Dynamics
・ Certified Forensic Computer Examiner
・ Certified Fraud Examiner
・ Certified Funds
・ Certified Gangstas
・ Certified General Accountant
・ Certified General Accountants Association of British Columbia
・ Certified General Accountants Association of Canada
・ Certified General Accountants of Ontario
・ Certificat de formation à la sécurité
・ Certificate
・ Certificate "A"
・ Certificate (complexity)
・ Certificate (HETAC)
Certificate authority
・ Certificate Authority Security Council
・ Certificate Examinations in Polish as a Foreign Language
・ Certificate for Students Achieving the Proficiency Level of Upper Secondary School Graduates
・ Certificate in Business Excellence
・ Certificate in Data Processing
・ Certificate in Education
・ Certificate in Education and Training
・ Certificate in Financial Studies
・ Certificate in Investment Performance Measurement
・ Certificate in Legal Practice (Malaysia)
・ Certificate in Management Studies
・ Certificate in Mortgage Advice and Practice
・ Certificate in Quantitative Finance
・ Certificate in Teaching in the Lifelong Learning Sector


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Certificate authority : ウィキペディア英語版
Certificate authority
In cryptography, a certificate authority or certification authority (CA) is an entity that issues digital certificates. A digital certificate certifies the ownership of a public key by the named subject of the certificate. This allows others (relying parties) to rely upon signatures or on assertions made by the private key that corresponds to the certified public key. In this model of trust relationships, a CA is a trusted third party – trusted both by the subject (owner) of the certificate and by the party relying upon the certificate. Many public-key infrastructure (PKI) schemes feature CAs.
==Overview==
Trusted certificates are typically used to make secure connections to a server over the Internet. A certificate is required in order to avoid the case that a malicious party which happens to be on the path to the target server pretends to be the target. Such a scenario is commonly referred to as a man-in-the-middle attack. The client uses the CA certificate to verify the CA signature on the server certificate, as part of the checks before establishing a secure connection. Usually, client software—for example, browsers—include a set of trusted CA certificates. That makes sense in as much as users need to trust their client software: A malicious or compromised client can skip any security check and still fool its users into believing otherwise.
The customers of a CA are server administrators who need a certificate that their servers will present to clients. Commercial CAs charge to issue certificates, and their customers expect the CA's certificate to be included by most web browsers, so that secure connections to the certified server work smoothly out of the box. The number of web browsers and other devices and applications that trust a particular certificate authority is referred to as ubiquity. Mozilla, which is a non-profit organization, distributes several commercial CA certificates with its products. While Mozilla developed their own policy, the CA/Browser Forum developed similar guidelines for CA trust. A single CA certificate may be shared among multiple CAs or their resellers. A ''root'' CA certificate may be the base to issue multiple ''intermediate'' CA certificates with varying validation requirements.
Aside from commercial CAs, some providers issue digital certificates to the public at no cost; a noteworthy example is CAcert. Large institutions or government entities may have their own PKIs, each including their own CAs. Formally, any site using self-signed certificates acts as its own CA too. Browsers and other clients typically allow users to add or remove CA certificates at will. While server certificates usually last for a rather short period, CA certificates last much longer, so, for frequently visited servers, it is less error-prone to import and trust the CA that issues their certificates rather than confirm a security exception every time the server's certificate is renewed.
A less frequent usage of trusted certificates is for encrypting or signing messages. CAs issue end-user certificates too, which can be used with S/MIME. However, encryption requires the recipient's public key and, since authors and recipients of encrypted messages presumably know one another, the usefulness of a trusted third party remains confined to the signature verification of messages sent to public mailing lists.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Certificate authority」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.