期刊文献+

SDSI中名字证书链的分布式发现

Distributed Name Certificate Chain Discovery in SDSI
下载PDF
导出
摘要 利用处理基于角色的证书体系的证书图,实现了对SDSI名字证书的处理。基于这种证书图,给出了针对SDSI名字证书的分布式搜索算法,并证明其可靠性和完备性,表明当证书适当存储时,该算法能搜索和找到相关证书并形成证书链。与现有的自下至上的证书搜索算法相比,该算法更好地适应了SDSI名字证书的分布式存储特性。作为有目的的搜索算法,它具备了自下至上算法所不具有的高效性、灵活性,更适合应用于海量证书分散存储的Internet。 Name certificates in SDSI are represented with some certificate graphs which were used to represent role-based certificates. For SDSI name certificates, this paper introduce a distributed searching algorithm based on certificate graphs and prove its soundness and completeness, It shows that the algorithm can search and discovery the related certificates and assemble a certificate chain when all name certificates are stored in an appropriate manner. The algorithm is better suited to the distributed property of storage of SDSI name certificates than the existing bottom-up algorithms. AS a goal-directed algorithm, it is more flexible and efficient than the bottom-up algorithms and has better performance in Internet where millions of certificates are distributed stored.
作者 秦益 杨波
出处 《计算机应用研究》 CSCD 北大核心 2005年第11期110-113,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(60372046)
关键词 简单的分布式安全基础设施 名字证书 证书链 搜索算法 SDSI(Simple Distributed Security Infrastructure) Name Certificate Certificate Chain Searching Algorithm
  • 相关文献

参考文献8

  • 1Rivest R L, et al. SDSI:A Simple Distributed Security Infrastructure[DB/OL].http://theory. lcs.mit.edu/~rivest/sdsi10. ps, 1996.
  • 2Rivest R L. Cryptography and Information Security Group Research Project: A Simple Distributed Security Infrastructure (SDSI)[DB/OL].http://theory. lcs.mit.edu/~cis/sdsi.html, 1996.
  • 3Ellion C M. SPKI/SDSI Certificate Documentation[DB/OL]. http://world.std.com/~cme/html/spki.html, 2001.
  • 4Elien J-E. Certificate Discovery Using SPKI/SDSI 2.0 Certificates[D]. USA: Massachusetts Institute of Technology,1998.
  • 5Clark D, Elien J-E, et al. Certificate Chain Discovery in SPKI/SDSI[J]. Journal of Computer Security,2001, 9(4):285-322.
  • 6Li N, Winsborough W H, Mitchell J C. Distributed Credential Chain Discovery in Trust Management[C]. Proceeding of the 8th ACM Conference on Computer and Communication Security, Philadelphia: ACM Press, 2001.156-165.
  • 7Halpern J Y, Meydon R. A Logic for SDSI's Linked Local Name Space[C]. Proceedings of the 12th IEEE Computer Society Security Foundations Workshop, Mordano:IEEE,1999.112-122.
  • 8Abadi M. On SDSI's Linked Local Name Space[J]. Journal of Computer Security, 1998,6(1-2):3-21.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部