期刊文献+

使用选择因子的证书路径构造算法

Certificate-path construction algorithm using selected factor
在线阅读 下载PDF
导出
摘要 为了改善广泛使用的广度优先证书路径构造算法在工作时缺乏灵活性的缺点,利用古典概率模型的思想设计了一种描述证书权威(certificate-authority)的选择因子的计算方法,并将其应用于证书路径构造算法。针对多种不同信任模型的实验结果表明,选择因子的使用使得新算法相较于广度优先算法减少了节点测试数量,且提高了针对多种潜在实际应用状况的灵活性。 Breadth-first search(BFS) algorithm is wildly in used,and it is lack of flexibility due to using the fist-in-first-out data structure.In order to improve the performance of path construction,this paper discussed a way to calculate the so-called selected factor value of a given certificate-authority(CA),which was based on classical probability model.Then it described a certificate-path construction algorithm.Experiment results show that new algorithm would reduce the amount of test nodes and become more flexible in practical environments.
出处 《计算机应用研究》 CSCD 北大核心 2013年第4期1048-1050,1063,共4页 Application Research of Computers
基金 广西可信软件重点实验室基金资助项目(PF11041X)
关键词 证书路径构造 选择因子 信任模型 公钥基础设施 certificate-path construction selected factor trust model PKI(public key infrastructure)
  • 相关文献

参考文献9

  • 1LIOYD S, NASH A, HOUSLEY R, et al. Understanding certificate path construction [ C/OL ]. ( 2002- 09 ) [ 2012- 09 ]. http ://www. oa- sis-pki, org/pdfs/Understanding_Path_construction-DS2, pdf.
  • 2COOPER M, DZAMBASOW Y ,HESSE P, et al. Internet X. 509 pub- lic key infrastructure .' certification path building [ EB/OL ]. ( 2005- 09 ) [ 2012-09 ]. http ://tools. ietf. org/rfc/rfc4158, txt.
  • 3HOUSLEY R, POLK W, FORD W, et al. Intemet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile [EB/OL]. (2002-04) [2012-09]. http://www, ietf. org/rfc/ rfc3280, txt.
  • 4白贞武.PKI中证书路径构造算法研究[J].科学技术与工程,2006,6(4):474-476. 被引量:2
  • 5ELLEY Y, ANDERSON A, HANNA S, et al. Building certification path : forward vs. reverse [ C/OL ]. ( 2001 ) [ 2012- 09 ]. http ://www. isoc. org/isoc/eonferences/ndss/01/papers/elley, pdf.
  • 6FUJISHIRO T, SATO A, KUMAGAI T,et al. Development of hi-speed X. 509 certification path validation system[ C ]//Proc of the 4th Inter- national Conference on Advanced Information Networking and Appli- cations Workshops. Washington DC : IEEE Computer Society, 2010 : 269 - 274.
  • 7熊熙,高飞.基于Dijkstra的PKI交叉认证路径搜索算法[J].计算机工程,2009,35(5):168-170. 被引量:8
  • 8徐蕾,孙尚波.基于严格二叉树的证书路径构造方法[J].计算机应用,2010,30(12):107-109. 被引量:4
  • 9GAO Zhi-wei, LUO Ping, GU Zhi-min, et al. A new and scalable certi- fication path discovery model in the emerging global PKI [ C ]//Proc of International Conference on Multimedia and Ubiquitous Engineer- ing. Washington DC : IEEE Computer Society,2007:372- 380.

二级参考文献13

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部