WEKO3
アイテム
A View on How to Design a PKI System
https://ipsj.ixsq.nii.ac.jp/records/45393
https://ipsj.ixsq.nii.ac.jp/records/453934b9c103c-dd39-4dd0-94b5-24c4a92efa6b
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
Copyright (c) 1999 by the Information Processing Society of Japan
|
|
オープンアクセス |
Item type | SIG Technical Reports(1) | |||||||
---|---|---|---|---|---|---|---|---|
公開日 | 1999-03-05 | |||||||
タイトル | ||||||||
タイトル | A View on How to Design a PKI System | |||||||
タイトル | ||||||||
言語 | en | |||||||
タイトル | A View on How to Design a PKI System | |||||||
言語 | ||||||||
言語 | jpn | |||||||
資源タイプ | ||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_18gh | |||||||
資源タイプ | technical report | |||||||
著者所属 | ||||||||
Mitsubishi Electric Corporation | ||||||||
著者所属(英) | ||||||||
en | ||||||||
Mitsubishi Electric Corporation | ||||||||
著者名 |
Jun, Yoshitake
× Jun, Yoshitake
|
|||||||
著者名(英) |
Jun, Yoshitake
× Jun, Yoshitake
|
|||||||
論文抄録 | ||||||||
内容記述タイプ | Other | |||||||
内容記述 | Design methods for a PKI (Public Key Infrastructure) system have to be established to build a practical and efficient PKI system. The author has discussed the methods indicating points such as information contained in a certificate distribution route of certificates and of CRL's (Certificate Revocation Lists) entity configuration etc. In this paper the discussion is focused on information contained in a certificate and on revocation management not to use CRL's. Three criteria for design of information contained in a certificate are proposed and it is shown that they are also considered to work for access control. A view to revocation management not to use CRL's is also shown. | |||||||
論文抄録(英) | ||||||||
内容記述タイプ | Other | |||||||
内容記述 | Design methods for a PKI (Public Key Infrastructure) system have to be established to build a practical and efficient PKI system. The author has discussed the methods, indicating points such as information contained in a certificate, distribution route of certificates and of CRL's (Certificate Revocation Lists), entity configuration, etc. In this paper, the discussion is focused on information contained in a certificate and on revocation management not to use CRL's. Three criteria for design of information contained in a certificate are proposed, and it is shown that they are also considered to work for access control. A view to revocation management not to use CRL's is also shown. | |||||||
書誌レコードID | ||||||||
収録物識別子タイプ | NCID | |||||||
収録物識別子 | AA11235941 | |||||||
書誌情報 |
情報処理学会研究報告コンピュータセキュリティ(CSEC) 巻 1999, 号 24(1998-CSEC-004), p. 49-54, 発行日 1999-03-05 |
|||||||
Notice | ||||||||
SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc. | ||||||||
出版者 | ||||||||
言語 | ja | |||||||
出版者 | 情報処理学会 |