期刊文献+

PnP-PKI的研究

Research of PnP-PKI
下载PDF
导出
摘要 以PKI使用的大众化作为研究的主要目标,具体分析研究了PnP-PKI的实现机制。首先分析PKI的一些具体现实问题,提出了PnP-PKI需要解决的问题和实现目标;通过进一步分析一些具体服务定位协议和实现机制的优势和不足,提出了PnP-PKI的实现机制,解决了普通用户使用PKI的透明性;最后通过对PnP-PKI的测试与分析,证实PnP-PKI能为非技术用户提供自动获取证书的方法,甚至用户没有意识到他们正在使用的证书,但用户能获知执行某件任务是否成功。这也为解决PKI使用的大众化提供了有价值的新思路。 In this paper, the popularity of using PKI is taken as a major goal that we research, and the realization mechanism of PnP-PKI (Plug-and-Play-PKI) is analyzed and studied. At first, this paper analyzes some concrete questions PKI in practice, and proposes some concrete questions and realization goals that PnP-PKI needs to solve. Secondly, through further analyzing the superiorities and shortcomings of some service localization protocols and realization mechanism, this paper proposes the realization mechanism of PnP-PKI, and the transparency of using PKI is solved. Finally, through testing and analyzing PnP-PKI, which shows PnP-PKI can provide the automatic obtaining certificate for the non-technical user, even users do not realize the certificate which they are using, but they can acquire the result of executing a certain task. At the same time, PnP-PKI proposed in this paper enlightens a new way for the popularity of using PKI.
出处 《计算机应用研究》 CSCD 北大核心 2006年第11期116-120,共5页 Application Research of Computers
基金 成都信息工程学院科技发展基金资助项目(CSRF-200406)
关键词 PnP-PKI 认证 证书 协议 服务定位 PnP-PKI (Plug-and-Play-PKI) Authentication Certificate Protocol Service Location
  • 相关文献

参考文献18

  • 1Dirk Balfanz, Glen Durfee, D K Smetters, et al. In Search of Usable Security: Five Lessons from the Field[ J]. IEEE Security and Privacy, 2004,2(5) :19.
  • 2Cryptlib Encryption Toolkit [ EB/OL]. http://www, cs. auckland.ac. nz/- pgut001/cryptlib/index, html.
  • 3Greg Goth. Santa Barbara Health Exchange: User-Driven Security Prevails[ J]. IEEE Security and Privacy, 2004,2(5) :8.
  • 4RFC 2131. Dynamic Host Configuration Protocol[ S].
  • 5Ken Arnold. The Jini Specification (2nd edition) [ M ]. Addison-Wesley, 2000.
  • 6Michael Jeronimo, Jack Weast. UPnP Design by Example: A Software Developer's Guide to Universal Plug and Play[ M ], Intel Press,2003.
  • 7Erik Guttman. Service Location Protocol: Automatic Discovery of IP Network Services[ J]. IEEE Intemet Computing, 1999,3 (4) :91.
  • 8IETF Draft. Interact X. 509 Public Key Infrastructure Operational Protocols: Certificate Store Access via HTTP[S].
  • 9Frank Stajano. The Resurrecting Duckling: What Next? [ C]. Proceedings of the 8th International Workshop on Security Protocols,Springer-Verlag Lecture Notes in Computer Science No. 2133,2000.204.
  • 10RFC 2510. Intemet X, 509 Public Key Infrastructure: Certificate Management Protocols[ S].

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部