메뉴 건너뛰기




Volumn 44, Issue 3-4, 2010, Pages 281-295

Geographic server distribution model for key revocation

Author keywords

Certifying authority; Geographic server distribution; Key revocation; Public Key Infrastructure; Strongest availability zone

Indexed keywords

AUTHENTICATION SERVERS; DISTRIBUTED MODELS; DISTRIBUTION MODELS; GAIN INFORMATION; KEY AUTHENTICATION; KEY DISTRIBUTION; KEY MANAGEMENT; KEY REVOCATION; NETWORK SERVICES; PUBLIC KEY INFRASTRUCTURE; REVOCATION MECHANISM; SECURITY AND PERFORMANCE; SERVICE AVAILABILITY;

EID: 77954886398     PISSN: 10184864     EISSN: 15729451     Source Type: Journal    
DOI: 10.1007/s11235-009-9254-x     Document Type: Article
Times cited : (7)

References (39)
  • 1
    • 21244466307 scopus 로고    scopus 로고
    • New approaches to digital evidence
    • Maurer, U. (2004). New approaches to digital evidence. Proceedings of the IEEE, 92 (6), 933-947.
    • (2004) Proceedings of the IEEE , vol.92 , Issue.6 , pp. 933-947
    • Maurer, U.1
  • 2
    • 77954887618 scopus 로고    scopus 로고
    • The World Internet Security Company, Last accessed 16th August 2008
    • The World Internet Security Company (2008). http://www1.wisekey.com/ products/. Last accessed 16th August (2008).
    • (2008)
  • 3
    • 77954887063 scopus 로고    scopus 로고
    • The Controller of Certifying Authority, Last accessed 21st August 2008
    • The Controller of Certifying Authority (2008). http://www.cca.gov.in. Last accessed 21st August (2008).
    • (2008)
  • 4
    • 77954888199 scopus 로고    scopus 로고
    • The National Informatics Centre, Certifying Authority, Last accessed 21st August 2008
    • The National Informatics Centre (2008). Certifying Authority, http://nicca.nic.in/index.jsp. Last accessed 21st August (2008).
    • (2008)
  • 5
    • 77954888069 scopus 로고    scopus 로고
    • The Tata Consultancy Services, Certifying Authority, Last accessed 21st August 2008
    • The Tata Consultancy Services (2008). Certifying Authority, http://www.tcs-ca.tcs.co.in. Last accessed 21st August (2008).
    • (2008)
  • 6
    • 27644512043 scopus 로고    scopus 로고
    • An efficient key distribution scheme with self-healing property
    • Hong, D., & Kang, J. (2005). An efficient key distribution scheme with self-healing property. IEEE Communications Letters, 9 (8), 759-761.
    • (2005) IEEE Communications Letters , vol.9 , Issue.8 , pp. 759-761
    • Hong, D.1    Kang, J.2
  • 8
    • 3242880752 scopus 로고    scopus 로고
    • Digital certificates: A survey of revocation methods
    • Los Angeles, California, United States
    • Wohlmacher, P. (2000). Digital certificates: a survey of revocation methods. In Proceedings of the 2000 ACM workshops on multimedia 2000 (pp. 111-114). Los Angeles, California, United States.
    • (2000) Proceedings of the 2000 ACM Workshops on Multimedia 2000 , pp. 111-114
    • Wohlmacher, P.1
  • 10
    • 33645797144 scopus 로고    scopus 로고
    • Tradeoffs in certificate revocation schemes
    • Zheng, P. (2003). Tradeoffs in certificate revocation schemes. ACM SIGCOMM Computer Communication Review, 33 (2), 103-112.
    • (2003) ACM SIGCOMM Computer Communication Review , vol.33 , Issue.2 , pp. 103112
    • Zheng, P.1
  • 12
    • 34648846428 scopus 로고    scopus 로고
    • Revocation-free publickey encryption based on security-mediated public-key infrastructure
    • Lo, C. M., Hwang, T., & Li, C. M. (2007). Revocation-free publickey encryption based on security-mediated public-key infrastructure. IET Information Security, 1 (3), 134-141.
    • (2007) IET Information Security , vol.1 , Issue.3 , pp. 134-141
    • Lo, C.M.1    Hwang, T.2    Li, C.M.3
  • 13
    • 85084163661 scopus 로고    scopus 로고
    • A method for fast revocation of public key certificates and security capabilities
    • Boneh, D., Ding, X., Tsudik, G., & Wong, M. (2001). A method for fast revocation of public key certificates and security capabilities. In Proc. 10th USENIX security symposium (pp. 297-308).
    • (2001) Proc. 10th USENIX Security Symposium , pp. 297-308
    • Boneh, D.1    Ding, X.2    Tsudik, G.3    Wong, M.4
  • 15
    • 35248866223 scopus 로고    scopus 로고
    • Certificate-based encryption and the certificate revocation problem
    • Berlin: Springer
    • Gentry, C. (2003). Certificate-based encryption and the certificate revocation problem. In LNCS: Vol. 2656. Proc. Eurocrypt 2003 (pp. 272-293). Berlin: Springer.
    • (2003) LNCS: Vol. 2656. Proc. Eurocrypt 2003 , pp. 272-293
    • Gentry, C.1
  • 16
    • 10844241569 scopus 로고    scopus 로고
    • Revocation invocation for accountable anonymous PKI certificate trees, computers and communications
    • 28 June-1 July 2004
    • Critchlow, D., & Zhang, N. (2004). Revocation invocation for accountable anonymous PKI certificate trees, computers and communications. In Proceedings of ISCC 2004, 28 June-1 July 2004 (Vol. 1, pp. 386-392).
    • (2004) Proceedings of ISCC 2004 , vol.1 , pp. 386-392
    • Critchlow, D.1    Zhang, N.2
  • 17
  • 21
    • 18244365875 scopus 로고    scopus 로고
    • Technical Report CSE-TR-366-98, EECS. University of Michigan, Ann Arbor
    • McDaniel, P., & Jamin, S. (1998). Key distribution hierarchy. (Technical Report CSE-TR-366-98, EECS). University of Michigan, Ann Arbor.
    • (1998) Key Distribution Hierarchy
    • McDaniel, P.1    Jamin, S.2
  • 22
    • 27644530407 scopus 로고    scopus 로고
    • A framework for the revocation of unintended digital signatures initiated by malicious terminals
    • Berta, I. Z., Buttya, L., & Vajda, I. (2005). A framework for the revocation of unintended digital signatures initiated by malicious terminals. IEEE Transactions on Dependable and Secure Computing, 2 (3), 268-272.
    • (2005) IEEE Transactions on Dependable and Secure Computing , vol.2 , Issue.3 , pp. 268-272
    • Berta, I.Z.1    Buttya, L.2    Vajda, I.3
  • 24
    • 4143075602 scopus 로고    scopus 로고
    • Neighbour discovery for IP version 6
    • December 1998
    • Narten, T., Nordmark, E., & Simpson, W. (1998). Neighbour discovery for IP version 6. RFC 2461, December 1998.
    • (1998) RFC 2461
    • Narten, T.1    Nordmark, E.2    Simpson, W.3
  • 26
    • 18844424009 scopus 로고    scopus 로고
    • Efficient state updates for key management
    • Pinkas, B. (2004). Efficient state updates for key management. Proceedings of the IEEE, 92 (6), 910-917.
    • (2004) Proceedings of the IEEE , vol.92 , Issue.6 , pp. 910-917
    • Pinkas, B.1
  • 28
    • 4143071218 scopus 로고    scopus 로고
    • The auto configuration of recursive DNS server and the optimization of DNS name resolution in hierarchical mobile IPv6
    • Jeong, J., Lee, K., Park, J., Lee, H., & Kim, H. (2003). The auto configuration of recursive DNS server and the optimization of DNS name resolution in hierarchical mobile IPv6. In Proc. vehicular technology conference (VTC 2003), Fall 2003 (Vol. 5, pp. 3439-3442).
    • (2003) Proc. Vehicular Technology Conference (VTC 2003), Fall 2003 , vol.5 , pp. 3439-3442
    • Jeong, J.1    Lee, K.2    Park, J.3    Lee, H.4    Kim, H.5
  • 29
    • 77954886850 scopus 로고    scopus 로고
    • The OPNET IT Guru Academic Edition, Last accessed 21st August 2008
    • The OPNET IT Guru Academic Edition (2008). http://www.opnet.com/ university-program/itguru-academic-edition/. Last accessed 21st August 2008.
    • (2008)
  • 30
    • 36849062175 scopus 로고    scopus 로고
    • Self-healing group-wise key distribution schemes with time-limited node revocation for wireless sensor networks
    • DOI 10.1109/MWC.2007.4396941
    • Shi, M., Shen, X., Jiang, Y., & Lin, C. (2007). Self-healing groupwise key distribution schemes with time-limited node revocation for wireless sensor networks. IEEE Wireless Communications, 14 (5), 38-46. (Pubitemid 350231652)
    • (2007) IEEE Wireless Communications , vol.14 , Issue.5 , pp. 38-46
    • Shi, M.1    Shen, X.2    Jiang, Y.3    Lin, C.4
  • 31
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • Clifford, B., Neuman, O., & Theodore, T. (1994). Kerberos: an authentication service for computer networks. IEEE Communications, 32 (9), 33-38.
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 33-38
    • Clifford, B.1    Neuman, O.2    Theodore, T.3
  • 34
    • 46149086521 scopus 로고    scopus 로고
    • Simplifying PKI usage through a client-server architecture and dynamic propagation of certificate paths and repository addresses
    • University of Marseille, France, 2-6 Sept
    • Hunter, B. (2002). Simplifying PKI usage through a client-server architecture and dynamic propagation of certificate paths and repository addresses. In Proceedings of 13th international workshop on database and expert systems applications (pp. 505-510). University of Marseille, France, 2-6 Sept.
    • (2002) Proceedings of 13th International Workshop on Database and Expert Systems Applications , pp. 505-510
    • Hunter, B.1
  • 35
    • 18144405252 scopus 로고
    • An access control protocol, sometimes called TACACS
    • July 1993
    • Finseth, C. (1993). An access control protocol, sometimes called TACACS. RFC1492, July 1993.
    • (1993) RFC1492
    • Finseth, C.1
  • 38
    • 0003315821 scopus 로고    scopus 로고
    • IP encapsulating security payload (ESP)
    • November 1998
    • Kent, S., & Atkinson, R. (1998). IP encapsulating security payload (ESP). RFC240, November 1998.
    • (1998) RFC240
    • Kent, S.1    Atkinson, R.2
  • 39
    • 33947383543 scopus 로고    scopus 로고
    • Dynamic delegation discovery system (DDDS): The domain name system (DNS) database
    • October 2002
    • Mealling, M. (2002). Dynamic delegation discovery system (DDDS): the domain name system (DNS) database. RFC 3403, October 2002.
    • (2002) RFC 3403
    • Mealling, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.