全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

一种高效的域间证书路径构建算法

DOI: 10.13190/jbupt.200605.28.shiwm, PP. 28-30

Keywords: 交叉认证,网状信任模型,证书路径构建

Full-Text   Cite this paper   Add to My Lib

Abstract:

域间证书路径的构建是一个非常复杂的过程,至今还没有一种非常有效的算法。针对此问题本文基于图论的理论思想提出了一种高效的证书路径构建算法,与其它同类算法相比,该算法使域间的证书路径构建更加简单、高效,且具有很强的扩展性。此外,该算法也适用于其它的信任模型。

References

[1]  Adams C,Lloyd S. Understanding public-key infrastructure:concepts, standards and deployment considerations[M]. : Macmillan Technical Publishing, 1999.
[2]  谢冬清, 冷键. PKI原理与技术[M]. 北京: 清华大学出版社, 2004. 46-72.
[3]  刘远航. PKI 交叉认证技术与交叉证书的实现//第十八次全国计算机安全学术交流会. 北京: , 2003. Liu Yuanhang. PKI cross-certification technology and realization//The eighteenth countrywide computer security science communion meeting. Beijing: , 2003.
[4]  Eyas Al-Hajery. Trust model in PGP and X.509 standard PKI. 2001(2004-05-01).
[5]  刘海龙, 张其善. PKI 的互操作与信任模型[J]. 计算机工程与应用, 2003, 24(3): 48-51. Liu Hailong, Zhang Qishan. PKI cross-operation and trust model[J]. Computer Engineering and Application, 2003, 24(3): 48-51.
[6]  Jim Turnbull. Cross-certification and PKI policy networking august. 2000(2005-04-01).
[7]  王晓峰, 王尚平. 公钥基础设施中的证书路径构造方法及验证算法[J]. 计算机工程与应用, 2002, 12(1): 51-56. Wang Xiaofeng, Wang Shangping. PKI certification path construction method and verification algorithm[J]. Computer Engineering and Application, 2002, 12(1): 51-56.
[8]  Lloyd S. Understanding certification path construction. 2002(2004-09-09).
[9]  Jun Xu, Mukesh Singhal. A. Certificate path generation algorithm for authenticated signaling in ATM networks[J]. The Ohio State University, 1997,10(2):98-109.
[10]  Pinkas D, Housley R. Delegated path validation and delegated path discovery protocol requirements[Z]. Internet Draft(Work in progress), 2002.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133