1Adams C, Farrell S. RFC 2510 Internet X. 509 Public Key Infrastructure Certificate Management Protocols[S]. RFC 2510, Internet Engineer Task Force, March 1999.
2Myers M, Adams C, Solo D, et al. RFC2511 Internet X. 509 Certif-icate Request Message Format[ S]. RFC 2511, Internet Engineer Task Force, March 1999.
3Housley R, Polk W, Ford W, et al. RFC 3280 Internet X. 509 Public Key Infrastructure Certificate and Certificate Revocation List(CRL) Profile[ S]. RFC 3280, Internet Engineer Task Force, April2002.
4ITU. Information Technology - Open system interconnection - The Directory: Public-key AndAttribute Certificate Frameworks [ EB/OL]. ITU-T Recommendation X. 509, ITU, 2000.
5Berkovits S, Chokhani S, Furlong JA, et al. Public Key Infrastructure Study: Final Repor[ DB/CD]. Produced by the MITRE Corporation for NIST, Apr. 1994.
6Cooper DA. A model of certificate revocation[ A]. In Proceedings of the Fifteenth Annual Computer Security Applications Conference[ C], 1999.256 -264.
7Adams C, Lloyd S. Understanding Public-Key Infrastructure: Concepts, Standards and Deployment Considerations[ M]. Macmillan Technical Publishing. 1999.
8Collaborative ITU and ISO/IEC meeting on the Directory. Final Proposed Draft Amendment on Certificate Extensions[ Z], April 1999.
9Ames A. Public Key Certificate Revocation Schemes[ D]. Department of Telematics. Norwegian University of Science and Technology, February 2000.
10Cooper DA. A More Efficient Use of Delta-CRLs[ A]. Proceedings of the 2000 IEEESymposium on Security and Privacy [ C], May2000. 190 -202.