期刊文献+

Internet公钥基础设施中的证书路径构造算法 被引量:7

The Construction Method and Validation Algorithm of Certificates Path in Public Key Infrastructure
在线阅读 下载PDF
导出
摘要 证书路径处理是实现公钥基础设施中安全认证的重要技术。建立在公钥基础设施上的用户只有通过有效的证书路径才能获得Internet有效的公钥证书。文章基于图的宽度优先搜索算法的思想理论,提出了公钥基础设施中证书路径的构造算法,并讨论了算法的有效性。 Certificates path processing is an important technology to realize security authenticating in Internet public key infrastructure. The users based on public key infrastructure get valid public key certificates only by valid certificates path. The algorithm for certificates path ,construction is proposed based on the theory of breadth first search algorithms for graphsand the efficiency of this algorithm is discussed.
出处 《计算机工程》 CAS CSCD 北大核心 2002年第6期69-70,151,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60073052) 陕西省教育厅自然科学研究计划资助项目(00JK266)
关键词 INTERNET 公钥基础设施 证书路径构造算法 认证机构 Public key infrastructure Certification authority Certificate path construction Certification path validation
  • 相关文献

参考文献1

  • 1冯登国(译).公开密钥基础设施概念、标准和实施[M].北京:人民邮电出版社,2001..

同被引文献29

  • 1周井泉,张顺颐,李明.一种基于多证书路径的认证[J].通信学报,2005,26(1):125-129. 被引量:2
  • 2黄迎春,何良生,蒋凡.基于逆向法和证书主体别名属性构造证书路径[J].计算机应用,2005,25(3):548-550. 被引量:2
  • 3AdamsC LloydS 冯登国 等译.公开密钥基础设施-概念、标准和实施[M].北京:北京人民邮电出版社,2001..
  • 4Mark DeLoura. Game Programming Gems 2 [ M ]. Charles River Media,2001 (10) :35 -50.
  • 5Amit J Patel. Amit's Thoughts on Path - Finding and A - Star [ M ]. http://theory. stanford. edu/- amitp/ GameProgramming/, 2003 : 138 - 140.
  • 6Patrick Lester. A * Pathfinding for Beginners [ M ]. http://www. policyalmanac.org/games/aStarTutorial.htm, 2003 : 117 - 121.
  • 7冯登国等译.公开密钥基础设施--概念、标准和实施[M].北京:人民邮电出版社,2001.96-98.
  • 8Peter M H, David P L. Managing Interoperability in Non Hierarchical Public Key Infrastructures [ C]. http:// www. isoc. org/isoc/conferences/ndss/02/ proceedings/ papers/hesse. pdf,2002.93 - 96.
  • 9ChkhaniI S,Hesse P. Path Development in a PKI Network Environment [ J ]. U. S Federal PKI Technical Working Group, 1999(8) :1 - 15.
  • 10[1]BEA Systems,Inc.Programming WebLogic Security[M].June 28,2006,171-180.

引证文献7

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部