{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:11:13Z","timestamp":1753884673250,"version":"3.41.2"},"reference-count":34,"publisher":"World Scientific Pub Co Pte Ltd","issue":"06","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J CIRCUIT SYST COMP"],"published-print":{"date-parts":[[2023,4]]},"abstract":"<jats:p> Digital certificates play a key role in the public key infrastructure (PKI). They are mainly used to secure communication between a browser and a webserver to keep the transmitted data safe from interception. Digital certificates are issued by certificate authorities (CAs). Numerous CAs serve as root CAs around the world. Moreover, root CAs can delegate intermediate CAs (ICAs). Any CA can issue a certificate for any entity on the internet world. However, it will be difficult for an end user to identify which authorities are trustworthy and genuine. In addition, adversaries can quickly induce fraudulent certificates due to a lack of rigorous background checks for domain possession at the time of certificate issuance. Our work is primarily oriented towards incorporating the domain validation and certificate validity check from the client side as an additional security fortification. This is in addition to a novel associative approach for domain validation using ICAs. This paper presents a novel two-tier system for domain validation of servers. The system operates at two levels. At the first level, an associative validation of the domains by making use of multiple ICAs is employed. A set of CAs validates domain ownership before issuing the certificate to prevent false issuance of the certificate. In addition to this, during the initiation of the client\u2013server connection, the client itself validates the certificate to make sure that the certificate received securely from any webserver is a genuine one. <\/jats:p>","DOI":"10.1142\/s0218126623501037","type":"journal-article","created":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T03:27:12Z","timestamp":1664508432000},"source":"Crossref","is-referenced-by-count":1,"title":["A Secure Two-Tier Domain Verification and Certificate Validation Integrating Intermediate Certificate Authorities and Secure Certificate Box"],"prefix":"10.1142","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7763-9089","authenticated-orcid":false,"given":"P. P.","family":"Rahoof","sequence":"first","affiliation":[{"name":"Division of Computer Science and Engineering, School of Engineering, Cochin University of Science and Technology, Kalamassery, Kochi, Kerala 682022, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Latha R.","family":"Nair","sequence":"additional","affiliation":[{"name":"Division of Computer Science and Engineering, School of Engineering, Cochin University of Science and Technology, Kalamassery, Kochi, Kerala 682022, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"V. P.","family":"Thafasal Ijyas","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, King Khalid University, Abaha 61421, Saudi Arabia"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"219","published-online":{"date-parts":[[2022,11,14]]},"reference":[{"first-page":"13","volume-title":"Proc. 4th Annual ACM Conf. Research in Information Technology","author":"Wang X.","key":"S0218126623501037BIB001"},{"key":"S0218126623501037BIB003","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MIC.2013.5","volume":"18","author":"Oppliger R.","year":"2013","journal-title":"IEEE Internet Comput."},{"first-page":"511","volume-title":"2013 IEEE Symp. Security and Privacy","author":"Clark J.","key":"S0218126623501037BIB005"},{"key":"S0218126623501037BIB006","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/MC.2011.367","volume":"44","author":"Leavitt N.","year":"2011","journal-title":"Computer"},{"key":"S0218126623501037BIB007","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MIC.2013.27","volume":"17","author":"Roosa S. B.","year":"2013","journal-title":"IEEE Internet Comput."},{"key":"S0218126623501037BIB008","doi-asserted-by":"crossref","first-page":"8527010","DOI":"10.1155\/2018\/8527010","volume":"2018","author":"Khan S.","year":"2018","journal-title":"Secur. Commun. Netw."},{"first-page":"833","volume-title":"27th USENIX Security Symp.","author":"Birge-Lee H.","key":"S0218126623501037BIB009"},{"first-page":"2060","volume-title":"Proc. 2018 ACM SIGSAC Conf. Computer and Communications Security","author":"Brandt M.","key":"S0218126623501037BIB010"},{"first-page":"83","volume-title":"2014 IEEE Symp. Security and Privacy","author":"Huang L. S.","key":"S0218126623501037BIB011"},{"first-page":"406","volume-title":"Proc. 2014 ACM SIGSAC Conf. Computer and Communications Security","author":"Szalachowski P.","key":"S0218126623501037BIB012"},{"key":"S0218126623501037BIB015","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/SP.2007.35","volume-title":"2007 IEEE Symp. Security and Privacy (SP\u201907)","author":"Schechter S. E.","year":"2007"},{"key":"S0218126623501037BIB017","first-page":"57","volume":"15","author":"Kaur N.","year":"2015","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"S0218126623501037BIB018","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1145\/3176244","volume":"61","author":"Zhang L.","year":"2018","journal-title":"Commun. ACM"},{"first-page":"799","volume-title":"Proc. 2014 ACM SIGSAC Conf. Computer and Communications Security","author":"Schulman A.","key":"S0218126623501037BIB019"},{"key":"S0218126623501037BIB020","first-page":"1","volume-title":"IEEE Web 2.0 Security and Privacy","author":"Topalovic E.","year":"2012"},{"first-page":"382","volume-title":"Proc. 2014 ACM SIGSAC Conf. Computer and Communications Security","author":"Basin D.","key":"S0218126623501037BIB021"},{"first-page":"228","volume-title":"Proc. IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","author":"Hsu Y.-K.","key":"S0218126623501037BIB022"},{"key":"S0218126623501037BIB027","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/2668152.2668154","volume":"12","author":"Laurie B.","year":"2014","journal-title":"Queue"},{"first-page":"679","volume-title":"Proc. 22nd Int. Conf. World Wide Web","author":"Kim T. H.-J.","key":"S0218126623501037BIB033"},{"first-page":"31","volume-title":"2011 Third Int. Workshop Security Measurements and Metrics","author":"Sufatrio","key":"S0218126623501037BIB034"},{"first-page":"17","volume-title":"USENIX Security Symp.","author":"Ma C.","key":"S0218126623501037BIB035"},{"key":"S0218126623501037BIB036","doi-asserted-by":"crossref","first-page":"127","DOI":"10.3233\/JCS-2009-0330","volume":"17","author":"Hu N.","year":"2009","journal-title":"J. Comput. Secur."},{"key":"S0218126623501037BIB038","first-page":"140","volume-title":"European Symp. Research in Computer Security","author":"Dowling B.","year":"2016"},{"key":"S0218126623501037BIB039","first-page":"218","volume-title":"Conf. Theory and Application of Cryptology","author":"Merkle R. C.","year":"1989"},{"key":"S0218126623501037BIB040","first-page":"622","volume-title":"European Symp. Research in Computer Security","author":"Pulls T.","year":"2015"},{"key":"S0218126623501037BIB041","first-page":"415","volume-title":"Conf. Communications and Network Security (CNS)","author":"Chuat L.","year":"2015"},{"key":"S0218126623501037BIB042","first-page":"105","volume-title":"Int. Conf. Data Mining Workshops (ICDMW)","author":"Dykcik L.","year":"2018"},{"key":"S0218126623501037BIB043","first-page":"345","volume-title":"Proc. 5th Int. Conf. Information Systems Security and Privacy (ICISSP)","volume":"1","author":"Guan Z.","year":"2019"},{"key":"S0218126623501037BIB044","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1016\/j.cose.2019.05.013","volume":"85","author":"Kubilay M. Y.","year":"2019","journal-title":"Comput. Secur."},{"key":"S0218126623501037BIB045","doi-asserted-by":"crossref","first-page":"681","DOI":"10.1109\/TDSC.2020.2983022","volume":"19","author":"Wang Z.","year":"2020","journal-title":"IEEE Trans. Depend. Secur. Comput."},{"key":"S0218126623501037BIB047","doi-asserted-by":"crossref","first-page":"102209","DOI":"10.1016\/j.cose.2021.102209","volume":"104","author":"Adja Y. C. E.","year":"2021","journal-title":"Comput. Secur."},{"key":"S0218126623501037BIB048","first-page":"9","volume-title":"4th Int. Conf. Collaboration and Internet Computing (CIC)","author":"Singla A.","year":"2018"},{"key":"S0218126623501037BIB049","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","volume":"82","author":"Khan M. A.","year":"2018","journal-title":"Fut. Gener. Comput. Syst."},{"key":"S0218126623501037BIB050","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1016\/j.comcom.2004.12.008","volume":"29","author":"Hormann T. P.","year":"2006","journal-title":"Comput. Commun."}],"container-title":["Journal of Circuits, Systems and Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218126623501037","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,18]],"date-time":"2023-04-18T05:48:56Z","timestamp":1681796936000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0218126623501037"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,14]]},"references-count":34,"journal-issue":{"issue":"06","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["10.1142\/S0218126623501037"],"URL":"https:\/\/doi.org\/10.1142\/s0218126623501037","relation":{},"ISSN":["0218-1266","1793-6454"],"issn-type":[{"type":"print","value":"0218-1266"},{"type":"electronic","value":"1793-6454"}],"subject":[],"published":{"date-parts":[[2022,11,14]]},"article-number":"2350103"}}