Incorporating revocation of certification into a PKI model

被引:0
|
作者
Azimzadeh, Fatemeh [1 ]
Khatun, Sabira. [1 ]
Ali, Borhannudin. M. [1 ]
Kargar, Mohammad. J. [1 ]
机构
[1] Univ Putra Malaysia, Fac Engn, Selangor 43400, Malaysia
关键词
certification; PKI; revocation; trust model;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Public Key Infrastructures (PKIs) are complex distributed systems that are responsible for giving users enough information to make reasonable trust judgments about one another. PKI is a prerequisite for security in distributed systems and for electronic commerce. The validation of public keys is hence of paramount importance. This is achieved by public-key certificates. Several researches have done to evaluate the confidence afforded; one of them is Maurer's model. The problem of assigning and evaluating confidence values numerically (Maurer model) is non-trivial, in particular when certification paths intersect. A restriction in this model is that certificate revocation is not included, but usually revocation happens. While Maurer consider only positive evidence, in this paper has been considered negative evidence as well as revocation. Moreover a few of authors incorporate negative values in inference rules on deterministic part. In this paper we have used a tailored form of that and consider revocation on inference rules. After that negative evidence to exert in probabilistic part, with to take in to a suitable value for this evidence omits the path of trust include the revoked certification.
引用
收藏
页码:770 / 775
页数:6
相关论文
共 50 条
  • [31] Proposed AeroMACS PKI Specification is a Model for Global and National Aeronautical PKI Deployments
    Crowe, Brian
    2016 INTEGRATED COMMUNICATIONS NAVIGATION AND SURVEILLANCE (ICNS), 2016,
  • [32] CAS Key Distribution Model with Revocation
    Kim, DaeYoub
    Lee, Jihoon
    Huh, Misuk
    2010 DIGEST OF TECHNICAL PAPERS INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS ICCE, 2010,
  • [33] Research on PKI Model Based on NTRU
    Wei, Shimin
    Zhuo, Zepeng
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 338 - 342
  • [34] Research on Model of Trust Degrees for PKI
    Zhang, Mingde
    Zheng, Xuefeng
    Yang, Wensheng
    Lv, Shuwang
    Zhang, Qingguo
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 647 - +
  • [35] A new trust model for PKI interoperability
    Guo, Z
    Okuyama, T
    Finley, MR
    2005 JOINT INTERNATIONAL CONFERENCE ON AUTONOMIC AND AUTONOMOUS SYSTEMS AND INTERNATIONAL CONFERENCE ON NETWORKING AND SERVICES (ICAS/ICNS), 2005, : 230 - 234
  • [37] Osteopathic Certification Evolving Into a Continuous Certification Model
    Moskowitz, Jack S.
    JOURNAL OF THE AMERICAN OSTEOPATHIC ASSOCIATION, 2008, 108 (09): : 530 - 530
  • [38] Osteopathic Certification Evolving Into a Continuous Certification Model
    Ayres, Ronald E.
    Scheinthal, Stephen
    Ramirez, Armando F.
    Bell, Elaine C.
    JOURNAL OF THE AMERICAN OSTEOPATHIC ASSOCIATION, 2008, 108 (03): : 159 - 174
  • [39] Geographic server distribution model for key revocation
    Sudip Misra
    Sumit Goswami
    Gyan Prakash Pathak
    Nirav Shah
    Isaac Woungang
    Telecommunication Systems, 2010, 44 : 281 - 295
  • [40] A Revocation Game Model for Secure Cloud Storage
    Jebalia, Maha
    Ben Letaifa, Asma
    Hamdi, Mohamed
    Tabbane, Sami
    2014 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS), 2014, : 1016 - 1017