ログイン 新規登録
言語:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

  1. 研究報告
  2. コンピュータセキュリティ(CSEC)
  3. 1999
  4. 24(1998-CSEC-004)

A View on How to Design a PKI System

https://ipsj.ixsq.nii.ac.jp/records/45393
https://ipsj.ixsq.nii.ac.jp/records/45393
4b9c103c-dd39-4dd0-94b5-24c4a92efa6b
名前 / ファイル ライセンス アクション
IPSJ-CSEC98004009.pdf IPSJ-CSEC98004009.pdf (411.8 kB)
Copyright (c) 1999 by the Information Processing Society of Japan
オープンアクセス
Item type SIG Technical Reports(1)
公開日 1999-03-05
タイトル
タイトル A View on How to Design a PKI System
タイトル
言語 en
タイトル A View on How to Design a PKI System
言語
言語 jpn
資源タイプ
資源タイプ識別子 http://purl.org/coar/resource_type/c_18gh
資源タイプ technical report
著者所属
Mitsubishi Electric Corporation
著者所属(英)
en
Mitsubishi Electric Corporation
著者名 Jun, Yoshitake

× Jun, Yoshitake

Jun, Yoshitake

Search repository
著者名(英) Jun, Yoshitake

× Jun, Yoshitake

en Jun, Yoshitake

Search repository
論文抄録
内容記述タイプ Other
内容記述 Design methods for a PKI (Public Key Infrastructure) system have to be established to build a practical and efficient PKI system. The author has discussed the methods indicating points such as information contained in a certificate distribution route of certificates and of CRL's (Certificate Revocation Lists) entity configuration etc. In this paper the discussion is focused on information contained in a certificate and on revocation management not to use CRL's. Three criteria for design of information contained in a certificate are proposed and it is shown that they are also considered to work for access control. A view to revocation management not to use CRL's is also shown.
論文抄録(英)
内容記述タイプ Other
内容記述 Design methods for a PKI (Public Key Infrastructure) system have to be established to build a practical and efficient PKI system. The author has discussed the methods, indicating points such as information contained in a certificate, distribution route of certificates and of CRL's (Certificate Revocation Lists), entity configuration, etc. In this paper, the discussion is focused on information contained in a certificate and on revocation management not to use CRL's. Three criteria for design of information contained in a certificate are proposed, and it is shown that they are also considered to work for access control. A view to revocation management not to use CRL's is also shown.
書誌レコードID
収録物識別子タイプ NCID
収録物識別子 AA11235941
書誌情報 情報処理学会研究報告コンピュータセキュリティ(CSEC)

巻 1999, 号 24(1998-CSEC-004), p. 49-54, 発行日 1999-03-05
Notice
SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc.
出版者
言語 ja
出版者 情報処理学会
戻る
0
views
See details
Views

Versions

Ver.1 2025-01-22 10:00:27.971374
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Cite as

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by WEKO3


Powered by WEKO3