메뉴 건너뛰기




Volumn , Issue , 2007, Pages 109-116

PKI design for the real world

Author keywords

Certificate management; PKI

Indexed keywords

INFORMATION MANAGEMENT; MATHEMATICAL MODELS; PROBLEM SOLVING; PROJECT MANAGEMENT; STANDARDS;

EID: 36949028920     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1278940.1278958     Document Type: Conference Paper
Times cited : (6)

References (29)
  • 1
    • 33744998346 scopus 로고    scopus 로고
    • Advances and Remaining Challenges to Adoption of Public Key Infrastructure Technology
    • United States General Accounting Office report GAO-0l-277, February
    • "Advances and Remaining Challenges to Adoption of Public Key Infrastructure Technology", United States General Accounting Office report GAO-0l-277, February 2001.
    • (2001)
  • 2
    • 36949036427 scopus 로고    scopus 로고
    • Solution and Problems : (Why) It's a long Way to Interoperability
    • Jürgen Schwemmer, September
    • "Solution and Problems : (Why) It's a long Way to Interoperability", Jürgen Schwemmer , Datenschutz und Datensicherheit, No.9, 2001 (September 2001).
    • (2001) Datenschutz und Datensicherheit , Issue.9 , pp. 2001
  • 3
    • 36949035330 scopus 로고    scopus 로고
    • Prime-Time Player?
    • Leo Pluswich and Darren Hartman, March
    • "Prime-Time Player?", Leo Pluswich and Darren Hartman, Information Security Magazine, March 2001.
    • (2001) Information Security Magazine
  • 4
    • 36949024429 scopus 로고    scopus 로고
    • PKI: An Insider View
    • Ben Rothke, October
    • "PKI: An Insider View", Ben Rothke, Information Security Magazine, October 2001.
    • (2001) Information Security Magazine
  • 5
    • 0343701135 scopus 로고    scopus 로고
    • RFC 2440, Jon Callas, Lutz Donnerhacke, Hal Finney, and Rodney Thayer, November
    • "OpenPGP Message Format", RFC 2440, Jon Callas, Lutz Donnerhacke, Hal Finney, and Rodney Thayer, November 1998.
    • (1998) OpenPGP Message Format
  • 6
    • 0003981627 scopus 로고    scopus 로고
    • RFC 2692, Carl Ellison, September
    • "SPKI Requirements", RFC 2692, Carl Ellison, September 1999.
    • (1999) SPKI Requirements
  • 7
    • 0003593599 scopus 로고    scopus 로고
    • RFC 2693, Carl Ellison, Bill Frantz, Butler Lampson, Ron Rivest, Brian Thomas, and Tatu Ylönen, September
    • "SPKI Certificate Theory", RFC 2693, Carl Ellison, Bill Frantz, Butler Lampson, Ron Rivest, Brian Thomas, and Tatu Ylönen, September 1999.
    • (1999) SPKI Certificate Theory
  • 8
    • 36949006461 scopus 로고    scopus 로고
    • PKI Account Authority Digital Signature Infrastructure
    • Anne Wheeler and Lynn Wheeler, draft-wheeler-ipki-aads-01.txt, 16 November
    • "PKI Account Authority Digital Signature Infrastructure", Anne Wheeler and Lynn Wheeler, draft-wheeler-ipki-aads-01.txt, 16 November 1998.
    • (1998)
  • 11
    • 36949023966 scopus 로고    scopus 로고
    • Identity-Based Cryptosystems and Signature Schemes, Adi Shamir, Proceedings of Crypto'84, Springer-Verlag Lecture Notes in Computer Science No.196, p.47.
    • "Identity-Based Cryptosystems and Signature Schemes", Adi Shamir, Proceedings of Crypto'84, Springer-Verlag Lecture Notes in Computer Science No.196, p.47.
  • 12
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing, Dan Boneh and Matthew Franklin, Proceedings of Crypto 2001, Springer-Verlag Lecture Notes in Computer Science No.2139, p.213
    • "Identity-Based Encryption from the Weil Pairing", Dan Boneh and Matthew Franklin, Proceedings of Crypto 2001, Springer-Verlag Lecture Notes in Computer Science No.2139, p.213
  • 13
    • 36949017705 scopus 로고    scopus 로고
    • PKI Billion-Dollar Boondoggle?
    • February
    • "PKI Billion-Dollar Boondoggle?", Information Security Magazine, February 2004, p. 14.
    • (2004) Information Security Magazine , pp. 14
  • 14
    • 12844272841 scopus 로고    scopus 로고
    • In Search of Usable Security: Five Lessons from the Field, Dirk Balfanz, Glenn Durfee, Rebecca Grinter, and D.K. Smetters, IEEE Security and Privacy, 2, No.5 (September/October 2004), p.19.
    • "In Search of Usable Security: Five Lessons from the Field", Dirk Balfanz, Glenn Durfee, Rebecca Grinter, and D.K. Smetters, IEEE Security and Privacy, Vol.2, No.5 (September/October 2004), p.19.
  • 17
    • 36949002005 scopus 로고    scopus 로고
    • th International Workshop on Security Protocols (Protocols'04), Springer-Verlag Lecture Notes in Computer Science No.3957, April 2004, p.306.
    • th International Workshop on Security Protocols (Protocols'04), Springer-Verlag Lecture Notes in Computer Science No.3957, April 2004, p.306.
  • 18
    • 36949024428 scopus 로고    scopus 로고
    • Criteria for Evaluating AAA Protocols for Network Access, RFC 2989, Bernard Aboba, Pat Calhoun, Steven Glass, Tom Hiller, Peter McCann, Hajime Shiino, Glen Zorn, Gopal Dommety, Charles Perkins, Basavaraj Patil, David Mitton, Serge Manning, Mark Anthony Beadles, Pat Walsh, Xing Chen, Sanjeevan Sivalingham, Alan Hameed, Mark Munson, Stuart Jacobs, Byung-Keun Lim, Brent Hirschman, Raymond Hsu, Haeng Koo, Mark Lipford, Ed Campbell, Yingchun Xu, Shinichi Baba, and Eric Jaques, November 2000.
    • "Criteria for Evaluating AAA Protocols for Network Access", RFC 2989, Bernard Aboba, Pat Calhoun, Steven Glass, Tom Hiller, Peter McCann, Hajime Shiino, Glen Zorn, Gopal Dommety, Charles Perkins, Basavaraj Patil, David Mitton, Serge Manning, Mark Anthony Beadles, Pat Walsh, Xing Chen, Sanjeevan Sivalingham, Alan Hameed, Mark Munson, Stuart Jacobs, Byung-Keun Lim, Brent Hirschman, Raymond Hsu, Haeng Koo, Mark Lipford, Ed Campbell, Yingchun Xu, Shinichi Baba, and Eric Jaques, November 2000.
  • 20
    • 36949030674 scopus 로고    scopus 로고
    • Chord: A Scalable Peer-to Peer Lookup Protocol for Internet Applications, Ion Stoica, Robert Morris, David Liben-Nowell, David Karger, M.Frans Kaashoek, Frank Dabek, and Hari Balakrishnan, Proceedings of ACM SIGCOMM 2001, August 2001, p.149.
    • "Chord: A Scalable Peer-to Peer Lookup Protocol for Internet Applications", Ion Stoica, Robert Morris, David Liben-Nowell, David Karger, M.Frans Kaashoek, Frank Dabek, and Hari Balakrishnan, Proceedings of ACM SIGCOMM 2001, August 2001, p.149.
  • 21
    • 0017018484 scopus 로고
    • New Directions in Cryptography
    • Whitfield Diffie and Martin Heliman, November
    • "New Directions in Cryptography", Whitfield Diffie and Martin Heliman, IEEE Transactions on Information Theory, Vol.22, No.6 (November 1976), p.644.
    • (1976) IEEE Transactions on Information Theory , vol.22 , Issue.6 , pp. 644
  • 22
    • 36949018667 scopus 로고    scopus 로고
    • Security for Computer Networks : An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer, Donald Davies and W.Price, John Wiley and Sons, 1984.
    • "Security for Computer Networks : An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer", Donald Davies and W.Price, John Wiley and Sons, 1984.
  • 23
    • 36949012934 scopus 로고    scopus 로고
    • th International Information Security Workshop (ISW'01), Springer-Verlag Lecture Notes in Computer Science No.2200, October 2001, p.378.
    • th International Information Security Workshop (ISW'01), Springer-Verlag Lecture Notes in Computer Science No.2200, October 2001, p.378.
  • 24
    • 84882980040 scopus 로고    scopus 로고
    • Plug-and-Play PKI: A PKI Your Mother Can Use
    • Peter Gutmann, August
    • th USENIX Security Symposium, August 2003, p.45.
    • (2003) th USENIX Security Symposium , pp. 45
  • 25
    • 85084163781 scopus 로고    scopus 로고
    • Lessons Learned in Implementing and Deploying Crypto Software
    • Peter Gutmann, August
    • th Usenix Security Symposium, August 2002, p.315.
    • (2002) th Usenix Security Symposium , pp. 315
  • 26
    • 0021918813 scopus 로고
    • What non-programmers know about programming: Natural language procedure specification
    • Kathleen Galotti and William. Ganong III, January
    • "What non-programmers know about programming: Natural language procedure specification", Kathleen Galotti and William. Ganong III, International Journal of Man-Machine Studies, Vol.22, No.1 (January 1985), p.1.
    • (1985) International Journal of Man-Machine Studies , vol.22 , Issue.1 , pp. 1
  • 27
    • 36949027300 scopus 로고    scopus 로고
    • Apropos: Re-Routed Packets, Tina Darmohray, ;login, 26, No.8 (December 2001), p.3.
    • "Apropos: Re-Routed Packets", Tina Darmohray, ;login, Vol.26, No.8 (December 2001), p.3.
  • 28
    • 36949031017 scopus 로고    scopus 로고
    • Extranet Directory Delivers Digital IDs for Millions of Customers
    • "Extranet Directory Delivers Digital IDs for Millions of Customers", http://wp.netscape.com/solutions/business/profiles/verisign. html.
  • 29
    • 33947408305 scopus 로고    scopus 로고
    • Replacing the Whois Protocol
    • Andrew Newton, July/August
    • "Replacing the Whois Protocol", Andrew Newton, IEEE Internet Computing, Vol.10, No.4 (July/August 2006), p.79.
    • (2006) IEEE Internet Computing , vol.10 , Issue.4 , pp. 79


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.