期刊文献+

PKI域间互操作性研究

Research on PKI Inter-domain Interoperability
下载PDF
导出
摘要 Internet作为电子商务和数字通信的基础平台面临着很多安全威胁.PKI技术为安全电子交易提供了保障.电子商务中,在不同的PKI域之间需要实现互操作.本文提出了一种不使用交叉证书的情况下连接多个独立的PKI域的新方法.该方法是将多个PKI域整合成一个PKI域来实现PKI域之间的互操作.本文采用形式化的方法来描述合并过程. Internet has confronted with many security threats as an infrastructure of E-commerce and digital communications. PKI technology provides security protection for secure electronic transactions. In E-commerce, different PKIs need to he interoperated. This paper takes a different approach from cross- certification techniques toward merging different PKIs. This method is to merge the multiple CAs into one,Then we formalize merging processes.
出处 《新疆大学学报(自然科学版)》 CAS 2008年第1期103-106,共4页 Journal of Xinjiang University(Natural Science Edition)
关键词 公钥基础设施(PKI) 证书机构(CA) 数字证书 互操作 PKI CA digital certificate interoperability
  • 相关文献

参考文献7

  • 1Lloyd S,et al. CA-CA Interoperability[EB/OL]. PKI Forum,2001. http://www.pkiforum.org/pdfs/ca-ca interop. pdf.
  • 2Linn J. Trust Models and Management in Public-Key Infrastructures [EB/OL]. RSA Laboratories, 2000, http:// www. rsasecurity. com/rsalabs/.
  • 3Lloyd S, et al. PKI Interoperability Framework [EB/OL]. PKIForum, 2001. http://www.pkiforum.org/pdfs/ PKIInteroperabilityFramework. pdf.
  • 4刘海龙,张其善,吴今培,原仓周.PKI的互操作与信任模型[J].计算机工程与应用,2003,39(24):97-99. 被引量:12
  • 5Adams S, Farrell S, Internet X. 509 Public Key Infrastructure Certificate Management Protocols [S]. Network Working Group Request for Comments 2510, 1999. http://www. ietf. org/rfc/rfc2510.txt.
  • 6Henderson M,et al. Modelling Trust for Public Key Infrastructures[C]. The 7th Australasian Conference on Information Security and Privacy (ACISP 2002), Lecture Notes in Computer Science, Springer-Verlag, 2002,2384: 56-70.
  • 7Satoshi Koga, Kouichi Sakurai. Decentralization Methods of Certification Authority Using the Digital Signature Schemes[C]. 2nd Annual PKI Research Workshop-Pre-proceedings, 2003.

二级参考文献8

  • 1W E Burr.Public Key Infrastructure(PKI)Technical Specifications: Part A-Technical Concept of Operations.Working Draft, http ://csrc. nist.gov/pki/twg/baseline/pkicon20b.PDF , 1998.
  • 2John Linn.Tmst Model and Management in Public-Key Infrastructures[R].Technical Report, ftp ://ftp.rsasecurity.com/pub/pdfs/PKIPa-per.pdf, 2000.
  • 3Steven Lloyd.PKI Interoperability Framework.Whiter Paper, http :// www.pkiforum.org/pdfs/PKIInteroperabilityFramework.pdf, 2001.
  • 4Capt James M Hayes.The Problem with Multiple Roots in Web Browsers-Certificate Masquerading[C].In:Enabling Technologies:Infrastructure for Collaborative Enterprises, (WET ICE'98)Proceedings, Seventh IEEE International Workshops on, 1998:306-311.
  • 5Steve Lloyd.CA-CA Interoperability.White Paper,http://www.pkiforum.org/pdfs/ca-ca_interop.pdf, 2001.
  • 6Andrew Young,Nada Kapidzic Cicovic,David Chadwick.Trust Models in ICE-TEL[C].In :Network and Distributed System Security,Proceedings, 1997:122-133.
  • 7Gatekeeper:A strategy for public key technology use in the Government.Australian Office of Government Information Technology,http:// www.govonline.gov.au/publications/GatekeeperStrategy.pdf, 1998.
  • 8Achieving PKI Interoperability.Technical Contribution to the APEC TEL WG,undated,http://www.apectelwg.org/apecdata/telwg/eaTG/ eatf06.html.

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部