Incorporating revocation of certification into a PKI model

被引:0
|
作者
Azimzadeh, Fatemeh [1 ]
Khatun, Sabira. [1 ]
Ali, Borhannudin. M. [1 ]
Kargar, Mohammad. J. [1 ]
机构
[1] Univ Putra Malaysia, Fac Engn, Selangor 43400, Malaysia
关键词
certification; PKI; revocation; trust model;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Public Key Infrastructures (PKIs) are complex distributed systems that are responsible for giving users enough information to make reasonable trust judgments about one another. PKI is a prerequisite for security in distributed systems and for electronic commerce. The validation of public keys is hence of paramount importance. This is achieved by public-key certificates. Several researches have done to evaluate the confidence afforded; one of them is Maurer's model. The problem of assigning and evaluating confidence values numerically (Maurer model) is non-trivial, in particular when certification paths intersect. A restriction in this model is that certificate revocation is not included, but usually revocation happens. While Maurer consider only positive evidence, in this paper has been considered negative evidence as well as revocation. Moreover a few of authors incorporate negative values in inference rules on deterministic part. In this paper we have used a tailored form of that and consider revocation on inference rules. After that negative evidence to exert in probabilistic part, with to take in to a suitable value for this evidence omits the path of trust include the revoked certification.
引用
收藏
页码:770 / 775
页数:6
相关论文
共 50 条
  • [41] Revocation in an Attribute-Based Delegation Model
    Ye, Chunxiao
    Wu, Zhongfu
    Zhong, Jiang
    Feng, Yong
    PROCEEDINGS OF THE 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, 2008, : 171 - 172
  • [42] Extending the Schematic Protection Model II: Revocation
    Varadharajan, Vijay
    Operating Systems Review (ACM), 1997, 31 (01): : 64 - 77
  • [43] Geographic server distribution model for key revocation
    Misra, Sudip
    Goswami, Sumit
    Pathak, Gyan Prakash
    Shah, Nirav
    Woungang, Isaac
    TELECOMMUNICATION SYSTEMS, 2010, 44 (3-4) : 281 - 295
  • [44] ASICS: authenticated key exchange security incorporating certification systems
    Boyd, Colin
    Cremers, Cas
    Feltz, Michele
    Paterson, Kenneth G.
    Poettering, Bertram
    Stebila, Douglas
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (02) : 151 - 171
  • [45] An Auto-revocation Supported Delegation Model
    Ye, Chunxiao
    Li, Xiang
    JOURNAL OF COMPUTERS, 2010, 5 (06) : 861 - 869
  • [46] Secure Certificateless Signature with Revocation in the Standard Model
    Tsai, Tung-Tso
    Huang, Sen-Shan
    Tseng, Yuh-Min
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2014, 2014
  • [47] Development of Certification Model
    Klochkov, Yury
    Odinokov, Sergey
    Klochkova, Elena
    Ostapenko, Maria
    Volgina, Anna
    2016 5TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2016, : 120 - 122
  • [48] PKI Model Optimisation in VANET with Clustering and Polling
    Thileeban, S. Arul
    Narayan, C. Sathiya
    Bhuvana, J.
    Balasubramanian, V
    INNOVATIONS IN BIO-INSPIRED COMPUTING AND APPLICATIONS, 2019, 939 : 321 - 329
  • [49] Research on open identity authentication model for PKI
    Zhang, L. (ling@scut.edu.cn), 2013, National University of Defense Technology (35):
  • [50] Lightweight Certificates - Towards a Practical Model for PKI
    Krzywiecki, Lukasz
    Kubiak, Przemyslaw
    Kutylowski, Miroslaw
    Tabor, Michal
    Wachnik, Daniel
    BUSINESS INFORMATION SYSTEMS, BIS 2012, 2012, 117 : 296 - 307