期刊文献+

PKI中信任查询协议的设计

The Design of Trust Inquiry Agreement in PKI
下载PDF
导出
摘要 分析了目前PKI体制中实体信任的缺陷,信任度机制可以有效提高目前PKI系统中实体间的信任级别。建立了实体在建立信任过程中的信任度查询协议,举例进行了验证并分析,证明其能够有效发现信任路径,使实体间快速建立信任。 The trust mechanism in Public Key Infrastructure system has many limitations. The trust valuation mechanism can improve the trust level. By examples, this paper proposes a trust inquiry agreement which can get the trust path efficiently.
机构地区 后勤工程学院
出处 《重庆科技学院学报(自然科学版)》 CAS 2006年第2期85-89,共5页 Journal of Chongqing University of Science and Technology:Natural Sciences Edition
关键词 PKI 信任度 信任查询 PKI trust valuation trust inquiry
  • 相关文献

参考文献10

  • 1沙瀛,白硕.当前公开密钥基础设施的主要问题分析[J].微电子学与计算机,2002,19(6):18-21. 被引量:10
  • 2Ellison C,Schneier B.Ten Risk of PKI:You're not Being Told about Public Key Infrastructure[J].Computer Security Journal,2000,16(1):235 -238.
  • 3Yahalom R,Klein B,Beth T.Trust Relationships in Secure Systems-A Distributed Authentication Perspective[J].Proc.1993 IEEE Symp.Research in Security and Privacy,1993(5):150-164.
  • 4Beth T,Borcherding M,Klein B.Valuation of Trust in Open Networks[A].Gollman D,Ed.proc.Camputer Security-ESORICS'94[C].Brithton:Springer-Verlag 1994.546-553.
  • 5Kohlas R,Maurer U.Confidence Valuation in Public-key Infrastructure Based on Uncertain Evidence[A].HIDEKI IMAI,YULIANG ZHENG.International Workshop on Practice and Theory in Public Key Cryptosystems 2000[C].Melboruen:[s.n.].2000.234-239.
  • 6U Maurer.Modelling a Public-Key Infrastructure[A].Bertino E,Kurth H,Martella G,Montolive E.Comprter Security-ESORICS ' 96[C].[s.l.]:[s.n.].1996(11):321-327.
  • 7Josang,Ingar Glenn Pedersen,Dean Povey.PKI Seeks a Trusting Relationship[A].Proceedings of the 2000 Australasian Conference on Information Security and Privacy(ACISP2000)[C].[s.l.][s.n.].2000.356-361.
  • 8Reiter M K,Stubblebine S G.Toward Acceptable Metrics of Authentication[J].Proc.1997 IEEE Symp.Security and Privacy,1997:10-20.
  • 9Abdul-Rahman,Hailes A.A Distributed Trust Model.[A].In:Proceed-ings of the 1997 New Security Paradigms Wordshop[C].Cumbria:ACM Press,1998(7):136-141.
  • 10Birgit Borcherding,Malte Borcherding.Covered Trust Values in Distributed Systems[A].In Proceedings of the Working Conference on Multimedia and Communication Security[C].Graz:Chapman & Hall,1995.117-123.

二级参考文献6

  • 1[1]C Ellison and B Schneier. Ten Risk of PKI:What you're not being told about Public Key Infrastructure. Computer Security Journal,2000,16(1):1~ 7. http:∥ www.counterpane.com/pki- risks.html
  • 2[2]Ronald L Rives. Can We Eliminate Certificate Revocation Lists?. 1999.
  • 3[3]Thierry Moreau. Thirteen Reasons to Say 'No' to Public Key Cryptography. Draft paper,March 4th,1998.(C) 1998 CONNOTECH Experts- conseils,Inc.
  • 4[4]Gerck E. Toward Real- World Models of Trust:Reliance on Received Information. Jan,1998.
  • 5[5]Roger Clarke. Conventional Public Key Infrastructure:An Artefact Ill- Fitted to the Needs of the Information Society. Nov,2000. http:∥ www.anu.edu.au/people/Roger. Clarke/II/PKIMisFit.html
  • 6[6]Gerck E. Certification:Intrinsic,Extrinsic,Combined. MCG. http:∥ www.mcg.org.br/cie.htm,1997.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部