{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:01Z","timestamp":1750220641619,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,7]],"date-time":"2020-10-07T00:00:00Z","timestamp":1602028800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,7]]},"DOI":"10.1145\/3368308.3415401","type":"proceedings-article","created":{"date-parts":[[2020,10,8]],"date-time":"2020-10-08T02:32:51Z","timestamp":1602124371000},"page":"419-425","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["DomainPKI"],"prefix":"10.1145","author":[{"given":"Xinli","family":"Wang","sequence":"first","affiliation":[{"name":"Grand Valley State University, Allendale, MI, USA"}]},{"given":"Mostafa","family":"El-Said","sequence":"additional","affiliation":[{"name":"Grand Valley State University, Allendale, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,10,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Ed. A. Melnikov and Ed. W. Chuang. 2018. Internationalized Email Addresses in X.509 Certificates. RFC 8398. RFC Editor. 1--12 pages. https:\/\/tools.ietf.org\/html\/rfc8398  Ed. A. Melnikov and Ed. W. Chuang. 2018. Internationalized Email Addresses in X.509 Certificates. RFC 8398. RFC Editor. 1--12 pages. https:\/\/tools.ietf.org\/html\/rfc8398","DOI":"10.17487\/RFC8398"},{"key":"e_1_3_2_1_2_1","unstructured":"Faizan Safdar Ali and Alptekin Kupcu. 2020. Improving PKI BGP and DNS Using Blockchain: A Systematic Review. arXiv:2001.00747 Cryptography and Security. https:\/\/arxiv.org\/abs\/2001.00747.  Faizan Safdar Ali and Alptekin Kupcu. 2020. Improving PKI BGP and DNS Using Blockchain: A Systematic Review. arXiv:2001.00747 Cryptography and Security. https:\/\/arxiv.org\/abs\/2001.00747."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2009.5202224"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660298"},{"key":"e_1_3_2_1_6_1","unstructured":"Sathya Bhat. 2011. Gmail Users in Iran Hit by MI\u2122 Attacks. Online. http:\/\/techie-buzz.com\/tech-news\/gmail-iran-hit-mitm.html last visited on June 1 2020.  Sathya Bhat. 2011. Gmail Users in Iran Hit by MI\u2122 Attacks. Online. http:\/\/techie-buzz.com\/tech-news\/gmail-iran-hit-mitm.html last visited on June 1 2020."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2018.11.006"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346853"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.41"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"D. Cooper S. Santesson S. Farrell S. Boeyen R. Housley and W. Polk. 2008. Internet X. 509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280. RFC Editor. 1--151 pages. https:\/\/tools.ietf.org\/html\/rfc5280  D. Cooper S. Santesson S. Farrell S. Boeyen R. Housley and W. Polk. 2008. Internet X. 509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280. RFC Editor. 1--151 pages. https:\/\/tools.ietf.org\/html\/rfc5280","DOI":"10.17487\/rfc5280"},{"volume-title":"Efficient Data Structures for Tamper-Evident Logging. In USENIX Security Symposium. USENIX","author":"Scott","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","unstructured":"T. Dierks and E. Rescorla. 2008. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246. RFC Editor. 1--104 pages. https:\/\/datatracker.ietf.org\/doc\/rfc5246\/ Last visited in May 2020.  T. Dierks and E. Rescorla. 2008. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246. RFC Editor. 1--104 pages. https:\/\/datatracker.ietf.org\/doc\/rfc5246\/ Last visited in May 2020."},{"volume-title":"2018 IEEE International Conference on Data Mining Workshops (ICDMW). IEEE","author":"Dykcik L.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","unstructured":"Peter Eckersley. 2011a. How secure is HTTPS today? How often is it attacked? online. https:\/\/www.eff.org\/deeplinks\/2011\/10\/how-secure-https-today last visited on May 26 2020.  Peter Eckersley. 2011a. How secure is HTTPS today? How often is it attacked? online. https:\/\/www.eff.org\/deeplinks\/2011\/10\/how-secure-https-today last visited on May 26 2020."},{"volume-title":"Sovereign Keys: A Proposal to Make HTTPS and Email More Secure. online. https:\/\/www.eff.org\/deeplinks\/2011\/11\/sovereign-keys-proposal-make-https-and-email-more-secure, last visited on","year":"2011","author":"Eckersley Peter","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","unstructured":"Peter Eckersley. 2011c. A Syrian Man-In-The-Middle Attack against Facebook. online. https:\/\/www.eff.org\/deeplinks\/2011\/05\/syrian-man-middle-against-facebook last visited on June 1 2020.  Peter Eckersley. 2011c. A Syrian Man-In-The-Middle Attack against Facebook. online. https:\/\/www.eff.org\/deeplinks\/2011\/05\/syrian-man-middle-against-facebook last visited on June 1 2020."},{"key":"e_1_3_2_1_17_1","unstructured":"Peter Eckersley. 2012. Sovereign Key Cryptography for Internet Domains. online. https:\/\/git.eff.org\/?p=sovereign-keys.git;a=blob_plain;f=sovereign-key-design.txt;hb=master last retrieved on December 21 2014.  Peter Eckersley. 2012. Sovereign Key Cryptography for Internet Domains. online. https:\/\/git.eff.org\/?p=sovereign-keys.git;a=blob_plain;f=sovereign-key-design.txt;hb=master last retrieved on December 21 2014."},{"key":"e_1_3_2_1_18_1","unstructured":"Peter Eckersley and Jesse Burns. 2010. Is the SSLiverse a Safe Place? online. https:\/\/www.eff.org\/files\/ccc2010.pdf last visited on June 1 2020.  Peter Eckersley and Jesse Burns. 2010. Is the SSLiverse a Safe Place? online. https:\/\/www.eff.org\/files\/ccc2010.pdf last visited on June 1 2020."},{"key":"e_1_3_2_1_19_1","unstructured":"Electronic Frontier Foundation. 2020 a. The EFF SSL Observatory. online. https:\/\/www.eff.org\/observatory last visited on June 1 2020.  Electronic Frontier Foundation. 2020 a. The EFF SSL Observatory. online. https:\/\/www.eff.org\/observatory last visited on June 1 2020."},{"key":"e_1_3_2_1_20_1","unstructured":"Electronic Frontier Foundation. 2020 b. The Sovereign Keys Project. online. https:\/\/www.eff.org\/sovereign-keys last visited on June 2 2020.  Electronic Frontier Foundation. 2020 b. The Sovereign Keys Project. online. https:\/\/www.eff.org\/sovereign-keys last visited on June 2 2020."},{"key":"e_1_3_2_1_21_1","first-page":"1","article-title":"Ten Risks of PKI: What You're not Being Told about Public Key Infrastructure","volume":"16","author":"Ellison Carl","year":"2000","journal-title":"Computer Security Journal"},{"key":"e_1_3_2_1_22_1","unstructured":"C. Evans C. Palmer and R. Sleevi. 2015. Public Key Pinning Extension for HTTP. Internet-Draft 7469. IETF. 1--28 pages. https:\/\/tools.ietf.org\/html\/rfc7469  C. Evans C. Palmer and R. Sleevi. 2015. Public Key Pinning Extension for HTTP. Internet-Draft 7469. IETF. 1--28 pages. https:\/\/tools.ietf.org\/html\/rfc7469"},{"key":"e_1_3_2_1_23_1","unstructured":"Nicolas Falliere Liam O Murchu and Eric Chien. 2011. W32.Stuxnet Dossier. White Paper. Symantec Security Response. 1--69 pages. https:\/\/nsarchive2.gwu.edu\/\/NSAEBB\/NSAEBB424\/docs\/Cyber-044.pdf https:\/\/nsarchive2.gwu.edu\/\/NSAEBB\/NSAEBB424\/docs\/Cyber-044.pdf last retrieved in May.  Nicolas Falliere Liam O Murchu and Eric Chien. 2011. W32.Stuxnet Dossier. White Paper. Symantec Security Response. 1--69 pages. https:\/\/nsarchive2.gwu.edu\/\/NSAEBB\/NSAEBB424\/docs\/Cyber-044.pdf https:\/\/nsarchive2.gwu.edu\/\/NSAEBB\/NSAEBB424\/docs\/Cyber-044.pdf last retrieved in May."},{"key":"e_1_3_2_1_24_1","unstructured":"Dennis Fisher. 2011. DigiNotar says its CA infrastructure was compromised. online. https:\/\/threatpost.com\/diginotar-says-its-ca-infrastructure-was-compromised-083011\/75594\/ last visited on June 1 2020.  Dennis Fisher. 2011. DigiNotar says its CA infrastructure was compromised. online. https:\/\/threatpost.com\/diginotar-says-its-ca-infrastructure-was-compromised-083011\/75594\/ last visited on June 1 2020."},{"key":"e_1_3_2_1_25_1","volume-title":"PGP & SKIP. The Bell","volume":"1","author":"Gerck Ed","year":"2000"},{"key":"e_1_3_2_1_26_1","unstructured":"GobalSign. 2011. Security Incident Report. online. https:\/\/www.globalsign.com\/en\/resources\/globalsign-security-incident-report.pdf. last visited on June 1 2020.  GobalSign. 2011. Security Incident Report. online. https:\/\/www.globalsign.com\/en\/resources\/globalsign-security-incident-report.pdf. last visited on June 1 2020."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1023787"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196791"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"R. Housley. 2018. Internationalization Updates to RFC 5280. RFC 8399. RFC Editor. 1--9 pages. https:\/\/tools.ietf.org\/html\/rfc8399  R. Housley. 2018. Internationalization Updates to RFC 5280. RFC 8399. RFC Editor. 1--9 pages. https:\/\/tools.ietf.org\/html\/rfc8399","DOI":"10.17487\/RFC8399"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"R. Housley W. Ford W. Polk and D. Solo. 1999. Internet X.509 Public Key Infrastructure Certificate and CRL Profile. RFC 2459. Network Working Group. 1--129 pages. https:\/\/tools.ietf.org\/html\/rfc2459  R. Housley W. Ford W. Polk and D. Solo. 1999. Internet X.509 Public Key Infrastructure Certificate and CRL Profile. RFC 2459. Network Working Group. 1--129 pages. https:\/\/tools.ietf.org\/html\/rfc2459","DOI":"10.17487\/rfc2459"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.13"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.022"},{"volume-title":"Proceedings of the 22Nd International Conference on World Wide Web (WWW '13). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland, 679--690","year":"2013","author":"Hyun-Jin Kim Tiffany","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.05.013"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2659897"},{"key":"e_1_3_2_1_36_1","unstructured":"B. Laurie A. Langley and E. Kasper. 2013. Certificate Transparency. RFC 6962. RFC Editor. 1--26 pages. https:\/\/tools.ietf.org\/html\/rfc6962  B. Laurie A. Langley and E. Kasper. 2013. Certificate Transparency. RFC 6962. RFC Editor. 1--26 pages. https:\/\/tools.ietf.org\/html\/rfc6962"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-005-0077-9"},{"volume-title":"Advances in Cryptology -- CRYPTO '87","author":"Merkle Ralph C.","key":"e_1_3_2_1_38_1"},{"key":"e_1_3_2_1_39_1","unstructured":"Microsoft. 2001. MS01-017: Erroneous VeriSign-Issued Digital Certificates Pose Spoofing Hazard. Online. https:\/\/docs.microsoft.com\/en-us\/security-updates\/SecurityBulletins\/2001\/ms01-017?redirectedfrom=MSDN. last viewed in May 2020.  Microsoft. 2001. MS01-017: Erroneous VeriSign-Issued Digital Certificates Pose Spoofing Hazard. Online. https:\/\/docs.microsoft.com\/en-us\/security-updates\/SecurityBulletins\/2001\/ms01-017?redirectedfrom=MSDN. last viewed in May 2020."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-017-0467-3"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2018.022021659"},{"key":"e_1_3_2_1_42_1","first-page":"3","article-title":"Evaluation of Certificate Validation Mechanisms","volume":"29","author":"Hormann T. Perlines","year":"2006","journal-title":"Computer Communications"},{"key":"e_1_3_2_1_43_1","unstructured":"Perspectives Project. 2019. Home page of the Perspectives project. online. https:\/\/perspectives-project.org\/ last visited on June 6 2020.  Perspectives Project. 2019. Home page of the Perspectives project. online. https:\/\/perspectives-project.org\/ last visited on June 6 2020."},{"key":"e_1_3_2_1_44_1","unstructured":"Fahmida Y. Rashid. 2011. Comodo Hacker Exploited Insecure Passwords to Generate SSL Certs. online. https:\/\/www.eweek.com\/security\/comodo-hacker-exploited-insecure-passwords-to-generate-ssl-certs. last visited on June 1 2020.  Fahmida Y. Rashid. 2011. Comodo Hacker Exploited Insecure Passwords to Generate SSL Certs. online. https:\/\/www.eweek.com\/security\/comodo-hacker-exploited-insecure-passwords-to-generate-ssl-certs. last visited on June 1 2020."},{"key":"e_1_3_2_1_45_1","unstructured":"E. Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446. RFC Editor. 1--152 pages. https:\/\/tools.ietf.org\/html\/rfc8446 Last visited in May 2020.  E. Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446. RFC Editor. 1--152 pages. https:\/\/tools.ietf.org\/html\/rfc8446 Last visited in May 2020."},{"key":"e_1_3_2_1_46_1","unstructured":"Ivan Risti\u0107. 2018. SSL\/TLS and PKI History. Online. Available at https:\/\/www.feistyduck.com\/ssl-tls-and-pki-history\/.  Ivan Risti\u0107. 2018. SSL\/TLS and PKI History. Online. Available at https:\/\/www.feistyduck.com\/ssl-tls-and-pki-history\/."},{"key":"e_1_3_2_1_47_1","unstructured":"Paul Roberts. 2011. Phony SSL certificates issued for Google Yahoo Skype others. threat post online. https:\/\/threatpost.com\/phony-ssl-certificates-issued-google-yahoo-skype-others-032311\/75061\/ last visited on June 1 2020.  Paul Roberts. 2011. Phony SSL certificates issued for Google Yahoo Skype others. threat post online. https:\/\/threatpost.com\/phony-ssl-certificates-issued-google-yahoo-skype-others-032311\/75061\/ last visited on June 1 2020."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"S. Santesson M. Myers R. Ankney A Malpani S. Galperin and C. Adams. 2013. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. RFC 6960. RFC Editor. 1--41 pages. https:\/\/tools.ietf.org\/html\/rfc6960  S. Santesson M. Myers R. Ankney A Malpani S. Galperin and C. Adams. 2013. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. RFC 6960. RFC Editor. 1--41 pages. https:\/\/tools.ietf.org\/html\/rfc6960","DOI":"10.17487\/rfc6960"},{"volume-title":"Blockchain-Based PKI Solutions for IoT. In 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC). IEEE","author":"Singla A.","key":"e_1_3_2_1_50_1"},{"volume-title":"Certified Lies: Detecting and Defeating Government Interception Attacks against SSL (Short Paper)","year":"2012","author":"Soghoian Christopher","key":"e_1_3_2_1_51_1"},{"key":"e_1_3_2_1_52_1","unstructured":"SSLShopper. 2008. SSL Certificate for Mozilla.com Issued Without Validation. Online. https:\/\/www.sslshopper.com\/article-ssl-certificate-for-mozilla.com-issued-without-validation.html. last viewed in May 2020.  SSLShopper. 2008. SSL Certificate for Mozilla.com Issued Without Validation. Online. https:\/\/www.sslshopper.com\/article-ssl-certificate-for-mozilla.com-issued-without-validation.html. last viewed in May 2020."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660355"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808062.2808068"},{"volume-title":"Proceedings of the 2015 International Conference on Security and Management (SAM'15 ). CSCE press","year":"2015","author":"Wang Xinli","key":"e_1_3_2_1_55_1"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"crossref","unstructured":"Z. Wang J. Lin Q. Cai Q. Wang D. Zha and J. Jing. 2020. Blockchain-based Certificate Transparency and Revocation Transparency. IEEE Transactions on Dependable and Secure Computing (2020) 1--1. https:\/\/doi.org\/10.1109\/TDSC.2020.2983022  Z. Wang J. Lin Q. Cai Q. Wang D. Zha and J. Jing. 2020. Blockchain-based Certificate Transparency and Revocation Transparency. IEEE Transactions on Dependable and Secure Computing (2020) 1--1. https:\/\/doi.org\/10.1109\/TDSC.2020.2983022","DOI":"10.1109\/TDSC.2020.2983022"},{"volume-title":"Proceedings of USENIX Annual Technical Conference. USENIX","year":"2008","author":"Wendlandt Dan","key":"e_1_3_2_1_57_1"},{"key":"e_1_3_2_1_58_1","unstructured":"Kathleen Wilson. 2015. Distrusting New CNNIC Certificates. Online. https:\/\/blog.mozilla.org\/security\/2015\/04\/02\/distrusting-new-cnnic-certificates\/. last viewed in May 2020.  Kathleen Wilson. 2015. Distrusting New CNNIC Certificates. Online. https:\/\/blog.mozilla.org\/security\/2015\/04\/02\/distrusting-new-cnnic-certificates\/. last viewed in May 2020."},{"key":"e_1_3_2_1_59_1","unstructured":"Chester Wisniewski. 2013. Turkish Certificate Authority screw up leads to attempted Google impersonation. naked security online. https:\/\/nakedsecurity.sophos.com\/2013\/01\/04\/turkish-certificate-authority-screwup-leads-to-attempted-google-impersonation\/. last visited on June 1 2020.  Chester Wisniewski. 2013. Turkish Certificate Authority screw up leads to attempted Google impersonation. naked security online. https:\/\/nakedsecurity.sophos.com\/2013\/01\/04\/turkish-certificate-authority-screwup-leads-to-attempted-google-impersonation\/. last visited on June 1 2020."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","unstructured":"P. Yee. 2013. Updates to the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 6818. RFC Editor. 1--8 pages. https:\/\/tools.ietf.org\/html\/rfc6818  P. Yee. 2013. Updates to the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 6818. RFC Editor. 1--8 pages. https:\/\/tools.ietf.org\/html\/rfc6818","DOI":"10.17487\/rfc6818"},{"key":"e_1_3_2_1_61_1","first-page":"1695","article-title":"DTKI","volume":"59","author":"Yu J.","year":"2016","journal-title":"A New Formalized PKI with Verifiable Trusted Parties. Comput. J."}],"event":{"name":"SIGITE '20: The 21st Annual Conference on Information Technology Education","sponsor":["SIGITE ACM Special Interest Group on Information Technology Education"],"location":"Virtual Event USA","acronym":"SIGITE '20"},"container-title":["Proceedings of the 21st Annual Conference on Information Technology Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368308.3415401","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368308.3415401","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:06Z","timestamp":1750197726000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368308.3415401"}},"subtitle":["Domain Aware Certificate Management"],"short-title":[],"issued":{"date-parts":[[2020,10,7]]},"references-count":59,"alternative-id":["10.1145\/3368308.3415401","10.1145\/3368308"],"URL":"https:\/\/doi.org\/10.1145\/3368308.3415401","relation":{},"subject":[],"published":{"date-parts":[[2020,10,7]]},"assertion":[{"value":"2020-10-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}