Online citations, reference lists, and bibliographies.
← Back to Search


E. Rescorla
Published 2000 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
This memo describes how to use TLS to secure HTTP connections over the Internet. Current practice is to layer HTTP over SSL (the predecessor to TLS), distinguishing secured traffic from insecure traffic by the use of a different server port. This document documents that practice using TLS. A companion document describes a method for using HTTP/TLS over the same port as normal HTTP [RFC2817].
This paper references

This paper is referenced by
The OAuth 2.0 Authorization Framework
D. Hardt (2012)
An Intrusion-Tolerant Web Server based on the DISTRACT Architecture
R. Ferraz (2004)
Application and network traffic correlation of grid applications
J. Paisley (2006)
Internet Engineering Task Force (ietf)
Sean Lawrence (2010)
Security and Privacy Awareness: for Software Creators and Users
Glenn Mansfield Keeni (2019)
A multi-resolution accountable logging and its applications
Bo Fu (2015)
Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking
Nasser Mohammed Al-Fannah (2019)
Unordered Delivery in TLS-Encrypted TCP Connections
B. Ford (2011)
GNuggies: A proposal for hosting resilient stateless services using untrusted nodes
Harshit Agarwal (2018)
Surviving the Web
S. Calzavara (2017)
The Seven Sins: Security Smells in Infrastructure as Code Scripts
A. Rahman (2019)
Unlocking the armour : enabling intrusion detection and analysis of encrypted traffic streams
B. Irwin (2005)
Finding Collisions for a 45-Step Simplified HAS-V
Nicky Mouha (2009)
VENO2 : a generic overlay infrastructure over heterogeneous networks.
Kuan. Yu (2009)
Computer Networks '2013
Jurgen Schonwalder (2013)
TALK: Topology Aware LKH Key Management
Dimitris Tsitsipis (2014)
Internet of Things: A survey on the security of IoT frameworks
M. Ammar (2018)
Use Cases for Content Delivery Network Interconnection
G. Bertrand (2012)
Survey of Authentication and Authorization for the Internet of Things
Michal Trnka (2018)
Securing Small Business and Home Internet of Things (IoT) Devices: Mitigating Network-Based Attacks Using Manufacturer Usage Description (MUD)
Donna Dodson (2019)
Security Issues and Solutions in Peer-to-Peer Systems for Realtime Communications
H. Schulzrinne (2010)
Data access pattern protection in cloud storage
J. Zhang (2016)
Internet X.509 Public Key Infrastructure - HTTP Transfer for the Certificate Management Protocol (CMP)
Tomi Kause (2012)
Analysis and Evaluation of Network Management Solutions : A Comparison of Network Management Solutions Suitable for Networks with 2,500+ Devices
Murat Gabdurahmanov (2016)
A Smart-Card Based DRM Authentication Scheme for Mobile TV System
Yi-Chun Zhang (2009)
Booters and Certificates : An Overview of TLS in the DDoS-as-a-Service Landscape
Benjamin Kuhnert (2017)
Authenticating HTTPS servers through the use of DNS in an Offline Personal Authentication Device (OffPAD)
Joakim Hovlandsvåg (2013)
Why the Equifax Breach Should Not Have Mattered
Marten Lohstroh (2018)
Trustworthy e-mail using secure XML Web services
S. Taylor (2005)
Aspects of network security for VoIP solutions using IMS core network and Wi-Fi access
Ruth S. Gayde (2007)
Fast Authentication Based on Heuristic Movement Prediction for Seamless Handover in Wireless Access Environment
L. Zhang (2007)
Dynamic CPU provisioning for self-managed secure web applications in SMP hosting platforms
J. Guitart (2008)
See more
Semantic Scholar Logo Some data provided by SemanticScholar