期刊文献+

PMI中的证书路径处理机制的优化

Certificate Path Processing Mechanism Opimizing Design in PMI
下载PDF
导出
摘要 在PMI中,证书路径的处理包含属性证书路径处理及各属性证书相对应的公钥证书路径的处理。其中证书路径构造尤为复杂和耗时,路径验证算法也没有考虑顺序,缺乏相应性能分析,阻碍了PMI的应用推广。提出一种优化的路径处理方案,给出了实现的流程图和算法,并进行了性能分析。 Certificate path processing includes the attribute certification and their corresponding public key certification path processing in PMI. The certificate path construction is more time-consuming and complicated among the path construction and path validation, and the algorithm for path validation is lack of efficiency analysis and takes no account of the order that it baffle the popularization of PMI. An optimizing design for the certification path processing is given, and offer a realized flow chart as well as algorithm, in the end the efficiency analysis is presented.
作者 王勇 吴昊
出处 《科学技术与工程》 2006年第12期1706-1709,共4页 Science Technology and Engineering
关键词 授权管理基础设施 路径构造 路径验证 路径处理优化 privilege management infrastructure processing optimization path construction path validation path
  • 相关文献

参考文献8

  • 1[1]ITU-T Recommendation X.509 | Iso/Iec 9594-8:.Information Technology.Open Systems Interconnection.The Directory:Public-Key And Attribute Certificate Frameworks.March.2000
  • 2[2]Housley R,Polk W,Ford W,Solo D.Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL)Profile,RFC3280,April 2002
  • 3[3]Farrell S,Housley R.An internet attribute certificate profile for authorization.RSA Laboratories,RFC3281,April 2002
  • 4卢震宇,戴英侠,胡艳.分布式认证系统互联的信任路径构建分析和实现[J].计算机工程与应用,2002,38(10):155-158. 被引量:8
  • 5[6]谢冬青,冷健.PKI的原理与技术.北京:清华大学出版社,2003
  • 6[7]Ghosh R K,Bhattacharjee G P.Parallel breadth first search algorithms for trees and graphs.Inter J Comput Math,1984; 15(3-4):255-268
  • 7[8]Zhu Y,Cheung T Y.A New distributed breadth-first-search algorithm.Inform Proc Lett,1987; 329-333
  • 8余胜生,龙春,周敬利,胡熠峰.一种PKI混合多级信任模型的分析和实现[J].计算机应用,2003,23(10):18-20. 被引量:8

二级参考文献8

  • 1NashA DuaneW JosephC etal.PKI Implement and Managing E-Security[M].北京:清华大学出版社,2002..
  • 2[1]William E Burr. Public Key Infrastructure Technical Specification:Part C-Concept of Operations. 1998-09-04
  • 3[2]Understanding Public-Key Infrastructure:Concept,Standard,and Deployment Consideration[M].Carlisle Adams Steve Lloyd. By Macmillan Technical Publishing, 1999
  • 4[3]W Ford,R Housley,W Polk et al. Internet X.509 PublicKey Infrastructure Certificate and CRL Profile[S].RFC 2459,1999-01
  • 5Perlman R. An overview of PKI trust models[ EB/OL]. netlab. cs.tsinghua. edu. cn/- xuke/paperlist/ An% 20overview% 20of%20PKI% 20trust% 20models. pdf, 2003 - 08.
  • 6Bakkali H, Kaitouni M. A Predicate Calculus Logic for the PKI Trust Model Analysis[ A]. The IEEE International Symposium on Network Computing and Applications[ C]. IEEE, 2002.
  • 7NashA DuaneW JosephC etal.PKI Implement and Managing E-Security[ M].北京:清华大学出版社,2002..
  • 8卢震宇,戴英侠,胡艳.分布式认证系统互联的信任路径构建分析和实现[J].计算机工程与应用,2002,38(10):155-158. 被引量:8

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部