期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Using Hash Tree for Delegation Revocation in Grids
1
作者 chi-tung chen Ming-Tsun Lin Iuon-Chang Lin 《Journal of Electronic Science and Technology》 CAS 2012年第3期256-262,共7页
Grid security infrastructure (GSI) provides the security in grids by using proxy certificates to delegate the work of authentication. At present, revocation proxy certificate has two kinds of methods, one is using c... Grid security infrastructure (GSI) provides the security in grids by using proxy certificates to delegate the work of authentication. At present, revocation proxy certificate has two kinds of methods, one is using certificate revocation list (CRL) and the other is giving the certificate a short period of validity. However, when a lot of certifications are revoked, CRL will be the burden in the system. If the certificate has a short period of validity, entities should be often updating the certificate. In this paper, we propose a scheme for proxy certificate revocation using hash tree. Our scheme only needs hash value comparisons to achieve the purpose of certificate revocation. Previous two methods have to wait the expiration of the certificate. Therefore, our scheme is more flexible than previous methods. 展开更多
关键词 DELEGATION grid computing gridsecurity hash tree.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部