期刊文献+

V2X PKI信任模型研究分析

Analysis and Research on Network Trust Models Based on V2X PKI
下载PDF
导出
摘要 信任模型是建立公钥基础设施信任体系的基础,决定着在构建整个PKI信任体系及进行跨域认证的技术框架。在车联网V2X PKI体系中,建立不同CA之间的信任模型,解决CA之间的互信互认是车联网V2X PKI大规模商用必须解决的问题。文章通过深入分析常见的几种CA信任模型的基础上,结合欧美V2X PKI信任模型的比较,并结合我国PKI标准及行业发展现状,对我国V2X PKI的网络信任模型进行了分析并提出建议。 The trust model is the basis for establishing a public key infrastructure trust system,which determines the technical framework for building the entire PKI trust system and cross-domain authentication.In the V2X PKI system,establishing a trust model between different CAs and solving the mutual trust and mutual recognition between CAs is a problem that must be solved for large-scale commercial use of V2X PKI.Based on the in-depth analysis of several common CA trust models,combined with the comparison of European and American V2X PKI trust models,and combined with my country's PKI standards and industry development status,this paper analyzes the network trust model of my country's V2X PKI and makes recommendations.
作者 赵万里 Zhao Wanli(Automotive Data of China Co.,Ltd,Tianjing 300393)
出处 《长江信息通信》 2021年第2期19-22,共4页 Changjiang Information & Communications
关键词 公钥基础设施 认证 信任 信任模型 V2X PKI certificate trust trust model V2X
  • 相关文献

参考文献3

二级参考文献17

  • 1朱鹏飞,戴英侠,鲍旭华.基于桥CA的高兼容性分布式信任模型[J].软件学报,2006,17(8):1818-1823. 被引量:9
  • 2彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 3John Linn.Trust Model and Management in Public-Key Inrfrastructures[EB/OL],Technical Report,6 November.2000.ftp://ftp.rsasecurity.com/pub/pdfs/PKIPaper.pdf.
  • 4卢开澄.计算机密码学[M].北京:科学出版社.1999.
  • 5D.Bruschi,A.Curti,E.Rosti.A quantitative study of Public Key Infrastructure[J].Computers & Security.2003.
  • 6Burr W.E.Public Key Infrastructure(PKI)Technical Specification:Part A-Technical Concept of Operations[DB/OL].Working Draft,4 September 1998.http://csrc.nist.gov/pki/twg/baseline/pkicong20b.pdf.
  • 7Ray Hunt,Technological Infrastructure for PKI and Digital Certification[J].Computer Communications,2001.
  • 8Andrew Nash,William Duane,Celia Joseph,and Derek Brink.PKI:ImPlementing and Managing E-Security[M].Osborne/McGraw-Hill.2003.
  • 9Su Bing, Lv Fang-fang, You Jing, Wang Hong-yuan. Anal- ysis and research on network trust models based on multi- CA. Second International Conference on Information Technology and Computer Science,2010:390-393.
  • 10Helena RiFa-Pous,Jordi Herrera-Joancomarti. An Interdo- main PKI Model Based on Trust Lists. EuroPKI 2007, LNCS 4582,2007:49-64.

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部