期刊文献+

PKI在信息安全中的应用与实现 被引量:4

PKI in the Application of Information Security and Realization
在线阅读 下载PDF
导出
摘要 公钥基础设施(PKI)是信息安全领域的研究热点。在对现有的信息安全技术进行分析和研究的基础上,提出一种典型的PKI体系结构。通过研究分析PKI在信息传输、信息交换、数据存储、身份验证等方面的应用与实现,解决网络应用中存在信息的真实性、保密性、完整性、可用性和不可抵赖性等安全问题。同时讨论了限制PKI应用的环境因素和在多个独立的PKI系统实现过程中需解决的问题。 Public key infrastructure (PKI) is a research focus of the field of information security, On the basis of analyzing and researching to the existing information security technology, the paper puts forward a kind of typical PKI architecture. Through researching and analyzing application and realization of PKI in information transmission, information exchange, data storage, authentication, etc, it solves the security problems of information authenticity, confidentiality, integrity, availability, non-repudiation and so on which exist in network application. And it discusses the environmental factor of restraining PKI applications and needing to solve problems while a lot of independent PKI systems realize.
作者 苏命峰
出处 《计算机时代》 2009年第7期15-17,共3页 Computer Era
基金 湖南省高等学校科学研究项目(06D054)
关键词 公钥基础设施 信息安全 文件加密 电子商务 public key infrastructure information security file encryption electronic commerce
  • 相关文献

参考文献3

二级参考文献23

  • 1RFC2409,D. Harkins, D. Carrel cisco Systems. Nov. 1998.
  • 2RFC2408,D. Maughan, National Security Agency M. Schertler,Security, Inc. M. Schneider, National Security Agency J. Turner, RABA Technologies, Inc. Nov. 1998.
  • 3RFC2412,H. Orman,Department of Computer Science, University of Arizona. Nov. 1998.
  • 4RFC2459,R. Housley SPYRUS, W. Ford VeriSign, W. Polk NIST, D. Solo Citicorp. Jan. ]999.
  • 5Burmester M. , Desmedt Y. , Seberry J.. equitable key escrow with limited time span. In: Advances in Cryptology-ASIACRYPT'98, Lecture Notes in Computer Science 1514. Heidelberg: Springer-Verlag, 1998, 380~391
  • 6Bellare M. , Goldwasser S.. Verifiable partial key escrow. In:Proceedings of the 4th ACM Conference on Computer and Communications Security, Zrich, Switzerland, 1997, 78~91
  • 7Bellare M. , Goldwasser S.. Encapsulated key escrow. MIT Laboratory for Computer Science: Technical Report 688, 1996
  • 8Mao W.. Verifiable partial escrow of integer factors. Designs,Codes and Cryptography, 2001, 24(3) :327-342
  • 9Shaoquan J., Yufeng Z.. Partial key escrow monitoring scheme. Cryptology ePrint Archive, 2002
  • 10Boneh D. , Franklin M.. Efficient generation of shared RSA keys. In, Advances in Cryptology-Crypto'97. Lecture Notesin Computer Science 1294. Heidelberg: Springer-Verlag,1997, 425~439

共引文献13

同被引文献12

引证文献4

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部