Claim Missing Document
Check
Articles

Found 1 Documents
Search
Journal : Blockchain Frontier Technology (BFRONT)

Supply Chain Management, Certificate Management at the Transportation Layer Security in Charge of Security Tsara Ayuninggati; Eka Purnama Harahap; Mulyati; Raihan Junior
Blockchain Frontier Technology Vol. 1 No. 01 (2021): B-Front(Blockchain Frontier Technology)
Publisher : IAIC Bangun Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/bfront.v1i01.3

Abstract

In the public key infrastructure, the certification authority is fully trusted, and the security of the public key infrastructure depends on the trust of the certification authority; however, recent attacks and corruption on the certification authority indicate that the certificate is forged when the certification authority fails . New solutions, blockchain-based public key infrastructure products and registry can repair vulnerabilities in public key infrastructure, especially weaker security systems. Proposals for infrastructure-based public key infrastructure. Public keys are still the target of global attacks. According to the registration of the target victim, it is signed as a temporary public key infrastructure based on the blockchain. High growth rates require permission to use the wallet. To solve this problem, this document introduces an integrated and responsible system for managing security certificates at the transport layer that represents the next generation of public key infrastructure.I merged two new architectures, introduced a new process, and created a registration and CA server. The domain owner has been notified. In supply chain management, the domain certificate signed by the CA is stored on the registration server, and the certificate server and the CA registration server are forwarded to the group that owns the domain. Compared with existing supply chain public key infrastructure products. The above-mentioned blockchain-based public key infrastructure scheme and registry are used for security and governance analysis.
Co-Authors Adam Faturahman Adrian Sean Bein Agung Ahmad, Alfian Dimas Ahsanul Rizki Aisyah, Euis Sitinur Alfiah Khoirunisa Alfiah Khoirunisa Alfian Dimas Ahsanul Rizki Ahmad Amelia, Sindy Anam, Reza Khaerul Ankur Singh Bist Chairun Nas Christianto, Dennies Dwi Darmawan, Muhammad Diky Desy Apriani Diah Aryani, Diah Dini Intan Pratiwi Dini Intan Pratiwi Dr SB Goyal Dwi Anjani Faisal Rizki Azhari Farida Agustin, Farida Fathoni, Muhammad Irzal Ferry Sudarto, Ferry Firmansyah, Ricko Fitra Putri Oganda Fresandy, Gilang Husna, Lina Naelal Immaniar, Dewi Ita Sari Perbina Manik Kenita Zelina Kenta, Hiroshi Leli Nirmalasari Luthfya Miranda M. C. Lohani Manurung, Jhordy Noverdian Mardiansyah, Aditya Marviola Hardini Md Asri Ngadi Mertayasa, I Komang Muhammad Diky Darmawan Muhammad Fachri Sholahuddin Muhammad Salamuddin Muhammad Zarlis, Muhammad Mulyati Mulyati Mulyati Mulyati Nesti Annggraini Santoso Nina Rahayu Ninda Lutfiani Nuke Puji Lestari Santoso Nur Ihsan Permadi Nurul, Fira Arbaimaniar Permana, Ridwan Yoga Po Abas Sunarya Pratama Sajati Pratiwi, Sarah Pratomo Cahyo Kurniawan Qurotul Aini Rahmat Bachtiar Raihan Junior Rakha Zuhdi Zein RH. Fitri Faradilla Ririn Eka Cipta Devi Riya Widayanti Rudi Edi Santoso Salamuddin, Muhammad Salsabila, Nabilah Salsabila, Salsabila Sandro Alfeno, Sandro Santoso, Nuke Puji Lestari Sayyin Alim, Zain Qutub Shino, Yamato Shylvia Ratna Dewi siti Nurindah Sari Suciani, Ayu Suwandi Suwandi Taqwa Hariguna Tarisya Ramadhan Tsara Ayuninggati Untung Rahardja Untung Raharja Vertika Agarwal Wardhani, Paramitha Kusuma Widhy Setyowati Wijayanti, Lidya Yusron, Calvin Wibisono Yusuf Abdurachman