only to be considered valid if executed during their
working hours or their shift hours, then a service can
be invoked to determine for a given signature time
whether the signer is authorized to sign. This is
important when signature credentials are associated
with the person’s role or location. Another variant is
to disable credentials when the owner is known to be
on vacation, traveling, or otherwise in a position
without the credentials. Such irregular intervals
could be handled in a way similar to normal business
hours using an external server to manage schedules.
The signature refreshing process, where the
number of signatures grows over time and each
signature encapsulates the prior ones, bears some
resemblance to a blockchain approach, such as that
used by Bitcoin (Bitcoin, 2019). The Bitcoin
blockchain has a similar problem that current
hashing and public key algorithms used for
transactions may be compromised later, and
algorithms and key sizes may change in the future.
This suggests that a blockchain may provide a
natural solution to the central signature repository.
However, the Bitcoin blockchain is decentralized
and requires vast computing resources to maintain,
and such a solution is not desirable for an enterprise.
Various private blockchain technologies attempt to
resolve this issue, but by making the blockchain
private, they give control to a central authority and
negate many of the features of the public blockchain.
Also, although many signatures are intended for
broad audiences, some are not, and a blockchain
approach that does not encrypt the content
appropriately is not an appropriate solution for
general digital signatures. Hence, current blockchain
technologies offer an approach that parallels some of
the concepts of digital signatures, and further work
in this area might provide a viable approach.
REFERENCES
Apple, “iOS Security, iOS 12.1”, November 2018,
https://www.apple.com/business/site/docs/iOS_Securit
y_Guide.pdf
Bitcoin, “Blockchain,” Bitcoin Developer Documentation,
available at https://bitcoin.org/en/blockchain-guide,
accessed December 9, 2019.
Cooper, D., et al., “Internet X.509 Public Key
Infrastructure Certificate and Certificate Revocation
List (CRL) Profile”, May 2018. Available at
https://tools.ietf.org/html/rfc5280, accessed December
9, 2019.
Entrust Datacard, “What is PKI?” available at
https://www.entrustdatacard.com/pages/what-is-pki,
accessed November 27, 2019.
Foltz, K. and Simpson, W., 2017. Enterprise Level
Security with Homomorphic Encryption. In
Proceedings of 19
th
International Conference on
Enterprise Information Systems (ICEIS 2017), Porto,
Portugal, April 26–29, 2017.
Foltz, K. and Simpson, W. R. 2016. “The Virtual
Application Data Center.” In: Proceedings of
Information Security Solutions Europe (ISSE) 2016.
Paris, France.
Foltz, K. and Simpson, W. R. 2016. “Enterprise Level
Security – Basic Security Model.” In: Proceedings of
the 20th World Multi-Conference on Systemics,
Cybernetics and Informatics: WMSCI, Volume I,
WMSCI 2016. Orlando, FL.
Foltz, K. and Simpson, W. R. 2016. “Federation for a
Secure Enterprise.” In: Proceedings of The Twenty-
first International Command and Control Research
and Technology Symposium (ICCRTS 2016). London,
UK.
Oasis, “PKCS #11 Cryptographic Token Interface Base
Specification Version 2.40,” Oasis Standard, April 14,
2015. Available at http://docs.oasis-open.org/pkcs11/
pkcs11-base/v2.40/os/pkcs11-base-v2.40-os.doc,
accessed December 9, 2019.
Samsung, “KNOX Platform Security”, Samsung
Developers website, Available at https://developer.
samsung.com/tech-insights/knox/platform-security
Simpson, W. R. 2016. Enterprise Level Security –
Securing Information Systems in an Uncertain World.
Boca Raton, FL: CRC Press, p. 397.
Trias, Eric D., et al. 2016. “Enterprise Level Security”,
Proceedings of the 35th MILCOM conference, DOI:
10.1109/MILCOM.2016.7795297 pp. 31-36,
http://ieeexplore.ieee.org/document/7795297/.
Trusted Computing Group, “TPM 2.0 Library
Specification”, September 29, 2016. https://trustedcom
putinggroup.org/resource/tpm-library-specification/
X.509 Standards
a) DoDI 8520.2, Public Key Infrastructure (PKI) and
Public Key (PK) Enabling, 24 May 2011
b) JTF-GNO CTO 06-02, Tasks for Phase I of PKI
Implementation, 17 January 2006
c) X.509 Certificate Policy for the United States
Department of Defense, Version 9.0, 9 February
2005
d) FPKI-Prof Federal PKI X.509 Certificate and CRL
Extensions Profile, Version 6, 12 October 2005
e) RFC Internet X.509 Public Key Infrastructure:
Certification Path Building, 2005
f) Public Key Cryptography Standard, PKCS #1
v2.2: RSA Cryptography Standard, RSA
Laboratories, Oct 27, 2012
g) PKCS#12 format PKCS #12 v1.0: Personal
Information Exchange Syntax Standard, RSA
Laboratories, June 1999.