期刊文献+

CRL分段-过量发布综合模型研究 被引量:8

Research on the Segmented and Over-Issued CRL Synthesis Model
下载PDF
导出
摘要 提出了一种应用证书撤消列表CRL(CertificaterevocationList)发布公钥基础设施PKI(Publickeyinfrastruc ture)证书状态信息新模型 :分段 过量发布综合模型 ,该模型采用先将CRL分段 ,然后各段独立过量发布的方式来实现 .通过分析表明 ,该方式既可以减少CRL的长度 ,使存储库以更快的速度提供请求服务 ,又可以降低峰值请求率、峰值带宽和平均负荷 ,减少时间碎片 ,满足大规模PKI对证书撤消的要求 . An improved model: the segmented and over-issued CRL synthesis model, which issues certificate status information with certificate revocation list in public key infrastructure's presented. It is realized by that CRL is segmented first, and then over-issued. Compared to other models, the improved model minimizes the size of CRL which can accelerate to request service, as well as the peak request rate, peak bandwidth, average loads and time piece on CRL repository. The improved model is fit for the large-scale PKIs according to the requirements.
出处 《电子学报》 EI CAS CSCD 北大核心 2005年第2期227-230,共4页 Acta Electronica Sinica
基金 现代通信国家重点实验室基金 (No.51 4 360 50 2 0 3DZ0 2 1 0 )
关键词 信息安全 证书撤消列表(CRL) 分段CRL 过量发布CRL 分段-过量发布 PKI Internet Mathematical models Probability Security of data
  • 相关文献

参考文献9

  • 1王尚平,张亚玲,王育民.证书吊销的线索二叉排序Hash树解决方案[J].软件学报,2001,12(9):1343-1350. 被引量:14
  • 2朱晶,沈美明,汪东升.Web服务系统的性能分析与测试[J].计算机工程与应用,2001,37(15):9-11. 被引量:10
  • 3S Micali.Efficient Certificate Revocation[M].Cambridge,MA,USA:Massachusetts Institute of Technology,1996.542-563.
  • 4Paul C Kochar.On certificate revocation and validation[A].Proceedings of the Second International Conference on Financial Cryptography[C].Berlin:Springer-Verlag,1998.171-177.
  • 5Moni,Naor,Kobbi,Nissim.Certificate revocation and certificate update[J].IEEE Journal on Selected Areasin Communications,2000,18(1):561-170.
  • 6Hously R,Ford W,Polk W,et al.Internet X.509 publickey infrastructure certificate and CRL profile[S].IETF RFC2459,1999,http://www.ietf.org/rfc/rfc2459.html.
  • 7André (A)rnes,Mike Just,Svein J,et al.Selecting revocation solutions for PKI[A].Proceedings of The Fifth Nordic Workshop on Secure IT Systems (NORDSEC 2000)[C].Reykjavik,Iceland,2000.360-376.
  • 8Cooper A Cooper.A more efficient use of Delta-CRLs[A].The Proceedings of the 2000 IEEE Symposium on Security and Privacy[C].Berkeley,2000.190-202.
  • 9David A Cooper.A model of certificate revoction[A].The Proceedings of Fifteenth Annual Comperter Security Application Conference[C].Phoenix,1999.256-264.

二级参考文献3

共引文献22

同被引文献97

引证文献8

二级引证文献49

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部