dc.contributor.author | Bour, Guillaume | |
dc.contributor.author | Bernsmed, Karin | |
dc.contributor.author | Meland, Per Håkon | |
dc.contributor.author | Borgaonkar, Ravishankar Bhaskarrao | |
dc.date.accessioned | 2021-10-14T13:25:20Z | |
dc.date.available | 2021-10-14T13:25:20Z | |
dc.date.created | 2021-03-08T12:09:13Z | |
dc.date.issued | 2021 | |
dc.identifier.citation | Lecture Notes in Computer Science (LNCS). 2021, 142-157. | en_US |
dc.identifier.issn | 0302-9743 | |
dc.identifier.uri | https://hdl.handle.net/11250/2823100 | |
dc.description.abstract | Maritime shipping is currently undergoing rapid digitalization, but with increasing exposure to cyber threats, there is a need to improve the security of the ship communication technology used during operations across international waters, as well as close to local shores and in ports. To this aid, there are ongoing standardization efforts for an international maritime Public Key Infrastructure, but the inherent properties of limited connectivity and bandwidth make certificate revocation a problematic affair compared to traditional Internet systems. The main contribution of this paper is an analysis of certificate revocation techniques based on how they fulfil fundamental maritime requirements and simulated usage over time. Our results identify CRLs (with Delta CRLs) and CRLite as the two most promising candidates. Finally, we outline the pros and cons with these two different solutions. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | Springer Nature | en_US |
dc.rights | Navngivelse 4.0 Internasjonal | * |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/deed.no | * |
dc.subject | Cyber security | en_US |
dc.subject | Cyber security | en_US |
dc.subject | Public key infrastructure | en_US |
dc.subject | Certificate revocation | en_US |
dc.subject | maritime | en_US |
dc.subject | shipping | en_US |
dc.title | On the Certificate Revocation Problem in the Maritime Sector | en_US |
dc.type | Peer reviewed | en_US |
dc.type | Journal article | en_US |
dc.description.version | publishedVersion | en_US |
dc.rights.holder | Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made. The images or other third party material in this chapter are included in the chapter’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. | en_US |
dc.source.pagenumber | 142-157 | en_US |
dc.source.journal | Lecture Notes in Computer Science (LNCS) | en_US |
dc.identifier.doi | 10.1007/978-3-030-70852-8_9 | |
dc.identifier.cristin | 1896312 | |
dc.relation.project | Norges forskningsråd: 295969 | en_US |
cristin.ispublished | true | |
cristin.fulltext | original | |
cristin.qualitycode | 1 | |