@techreport{oai:ipsj.ixsq.nii.ac.jp:00045393, author = {Jun, Yoshitake and Jun, Yoshitake}, issue = {24(1998-CSEC-004)}, month = {Mar}, note = {Design methods for a PKI (Public Key Infrastructure) system have to be established to build a practical and efficient PKI system. The author has discussed the methods indicating points such as information contained in a certificate distribution route of certificates and of CRL's (Certificate Revocation Lists) entity configuration etc. In this paper the discussion is focused on information contained in a certificate and on revocation management not to use CRL's. Three criteria for design of information contained in a certificate are proposed and it is shown that they are also considered to work for access control. A view to revocation management not to use CRL's is also shown., Design methods for a PKI (Public Key Infrastructure) system have to be established to build a practical and efficient PKI system. The author has discussed the methods, indicating points such as information contained in a certificate, distribution route of certificates and of CRL's (Certificate Revocation Lists), entity configuration, etc. In this paper, the discussion is focused on information contained in a certificate and on revocation management not to use CRL's. Three criteria for design of information contained in a certificate are proposed, and it is shown that they are also considered to work for access control. A view to revocation management not to use CRL's is also shown.}, title = {A View on How to Design a PKI System}, year = {1999} }