The expansibility of PKI is expected to have the features that when the amount of user exceeds the system capacity, the users’ requirement can still be met by simply expanding the number of PKI entities and managemen...The expansibility of PKI is expected to have the features that when the amount of user exceeds the system capacity, the users’ requirement can still be met by simply expanding the number of PKI entities and management levels, and this expansion should be achieved smoothly from the original system. The upward, downward, and horizontal expansions of PKI are discussed in this paper. A path discovery method is suggested to reduce the effect of PKI expansion to the end entities, so as to enhance the availbility of PKI services.展开更多
We introduce the general AC( atlribure certificate), the role specificationAC and the rolt assignment AC We discuss the rolt-based PMI(Privilege Management Infrastructure)architecture. The role-based PMT(Public-Kty In...We introduce the general AC( atlribure certificate), the role specificationAC and the rolt assignment AC We discuss the rolt-based PMI(Privilege Management Infrastructure)architecture. The role-based PMT(Public-Kty In-frastructure) secure model forE-govcrnment isresearehed by combining the role-bastd PMI with PKI architeclure (Public Key Infrastructure). Themodel has advantages of flexibility, convenience, less storage space and less network consumptionetc. We are going to ust iht secure modelin the E-govern-ment system.展开更多
文摘The expansibility of PKI is expected to have the features that when the amount of user exceeds the system capacity, the users’ requirement can still be met by simply expanding the number of PKI entities and management levels, and this expansion should be achieved smoothly from the original system. The upward, downward, and horizontal expansions of PKI are discussed in this paper. A path discovery method is suggested to reduce the effect of PKI expansion to the end entities, so as to enhance the availbility of PKI services.
文摘We introduce the general AC( atlribure certificate), the role specificationAC and the rolt assignment AC We discuss the rolt-based PMI(Privilege Management Infrastructure)architecture. The role-based PMT(Public-Kty In-frastructure) secure model forE-govcrnment isresearehed by combining the role-bastd PMI with PKI architeclure (Public Key Infrastructure). Themodel has advantages of flexibility, convenience, less storage space and less network consumptionetc. We are going to ust iht secure modelin the E-govern-ment system.