期刊文献+

基于P2P的数字证书撤销列表更新方案及性能分析 被引量:1

A P2P-Based Certificate Revocation List Distribution Scheme and Its Performance Analysis
下载PDF
导出
摘要 针对数字证书撤销列表更新中大量结点同时请求数据造成的系统性能瓶颈,本文提出了基于P2P的数字证书撤销列表更新方案,利用客户结点的资源改善证书撤销列表的更新性能;以数字校园应用为背景建立了分析模型,对所提方案进行了分析比较。 Updating the certificate revocation list(CRL)by large amount of certificate users at the same time results in a performance bottleneck in PKI systems.By addressing this problem,this paper introduces a P2P-based CRL update scheme,which utilizes the resources on the CRL users to improve CRL update performance.Analytical models are built to compare the P2P-based scheme with other schemes in digital campus applications.
出处 《计算机工程与科学》 CSCD 2007年第2期24-25,35,共3页 Computer Engineering & Science
基金 国家863计划资助项目(2004AA112020)
关键词 对等网 数字证书 证书撤销列表 模型 peer-to-peer,digital certificate,CRL,model
  • 相关文献

参考文献6

  • 1Housley R,Polk W,Ford W,et al.Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile[S].RFC 3280,2002.
  • 2Zheng P.Tradeoffs in Certificate Revocation Schemes[J].ACM SIGCOMM Computer Communications Review,2003,33(2):103-112.
  • 3Arnes A.Public Key Certificate Revocation Schemes:[Ph D Thesis][D].Norwegian University of Science and Technology,2000.
  • 4Pouwelse J,Garbacki P,Eperna D,et al.The Bittorrent P2P File-Sharing System:Measurements and Analysis[A].Proc of 4th Int'l Workshop on Peer-to-Peer Systems[C].2005.103-108.
  • 5Qiu D,Srikant R.Modeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks[A].Proc of SIGCOMM'04[C].2004.185-195.
  • 6Myers M,Anknkey R,Malpani A,et al.Internet X.509 Public Key Infrastructure Online Certificate Status Protocol-OCSP[S].RFC 2560,1999.

同被引文献12

  • 1谭良,佘堃,周明天.CRL增量-过量发布综合模型研究[J].计算机科学,2005,32(4):133-136. 被引量:10
  • 2高迎,程涛远,王珊.对等网信任管理模型及安全凭证回收方法的研究[J].计算机学报,2006,29(8):1282-1289. 被引量:8
  • 3Intemet X.509 Public Key Infrastructure PKIX roadmap[EB/OL]. ( 1999-10-22 ) .http ://tools .let f.org/html/draft-iet f-pkix-roadmap-04.
  • 4Berkovits S, Chokhani S,Furlong J A, et al.Public key infrastructure study: Final report[R].MITRE Corporation for NIST, 1994,.
  • 5Hourly R, Ford W,Polk W,et al.RFC2459 Intemet X.509 public key infrastructure certificate and CRL profile[S/OL].IETF.2009. http://www.ietf.org/r fc/rfc2459.html.
  • 6Ames A, Just M, Knapskong S J, et al.Selecting revocation solution for PKI[C]//Proc of the 5th Nordic Workshop on Secure IT Systems(NORDSEC 2000),Reykjavik,Ieeland,2000:360-376.
  • 7Cooper D A.A more efficient use of Delta-CRLs[C]//Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000 :190-202.
  • 8Cooper D A.A model of certificate revocation[C]//Proceedings of the 15th Annual Computer Security Applications Conference, 1999: 256-264.
  • 9Wolff T.Public-Key-Infrastrucmre based on a Peer-to-Peer network[C]//Proceedings of the 38th Annual Hawaii International Conference on System Sciences,2005.
  • 10Ripeanu M, Foster I, Iamnitchi A.Mapping the Gnutella net- work:Properties of large-scale peer-to-peer systems and implications for system design[J].IEEE Internet Computing, 2002,6( 1 ).

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部