GLOSSARY ENTRY (DERIVED FROM QUESTION BELOW) | ||||||
---|---|---|---|---|---|---|
|
10:55 Jul 1, 2016 |
English to Bulgarian translations [PRO] Computers: Systems, Networks | |||||||
---|---|---|---|---|---|---|---|
|
| ||||||
| Selected response from: Ekaterina Kroumova | ||||||
Grading comment
|
Summary of answers provided | ||||
---|---|---|---|---|
3 +1 | кръстосано подписан |
|
кръстосано подписан Explanation: Пуснете в търсачка за кръстосано подписване на сертификати, ще ви излязат немалко резултати. -------------------------------------------------- Note added at 18 minutes (2016-07-01 11:13:07 GMT) -------------------------------------------------- It's about expanding trust, yes. If you trust both CA1 and CA2, and a cert is signed by both, you've got a very high level of trust because two seaparate entities that you trust have verified the cert. It has the added bonus of increasing the ease of verification of trust, such as situations where you've got clients that trust CA1 or CA2 (but not both). In such a case, you can cross-sign a cert to be trusted by both. This allows more clients to verify trust without having to distribute separate certs for different CAs. Another bonus is in situations where a CA's private key is leaked. Let's say CA1's key leaks and your cert is signed by CA1 and CA2. In the wake of the leak, CA1 issues a revokation for its public key and you can no longer trust anything issued by CA1. However, since your cert is cross-signed to CA2 as well, any client that trusts CA2 can still maintain a level of trust in your cert. http://security.stackexchange.com/questions/14043/what-is-th... |
| ||
Notes to answerer
| |||
Login to enter a peer comment (or grade) |
Login or register (free and only takes a few minutes) to participate in this question.
You will also have access to many other tools and opportunities designed for those who have language-related jobs (or are passionate about them). Participation is free and the site has a strict confidentiality policy.