@techreport{oai:ipsj.ixsq.nii.ac.jp:00045393,
 author = {Jun, Yoshitake and Jun, Yoshitake},
 issue = {24(1998-CSEC-004)},
 month = {Mar},
 note = {Design methods for a PKI (Public Key Infrastructure) system have to be established to build a practical and efficient PKI system. The author has discussed the methods  indicating points such as information contained in a certificate  distribution route of certificates and of CRL's (Certificate Revocation Lists)  entity configuration  etc. In this paper  the discussion is focused on information contained in a certificate and on revocation management not to use CRL's. Three criteria for design of information contained in a certificate are proposed  and it is shown that they are also considered to work for access control. A view to revocation management not to use CRL's is also shown., Design methods for a PKI (Public Key Infrastructure) system have to be established to build a practical and efficient PKI system. The author has discussed the methods, indicating points such as information contained in a certificate, distribution route of certificates and of CRL's (Certificate Revocation Lists), entity configuration, etc. In this paper, the discussion is focused on information contained in a certificate and on revocation management not to use CRL's. Three criteria for design of information contained in a certificate are proposed, and it is shown that they are also considered to work for access control. A view to revocation management not to use CRL's is also shown.},
 title = {A View on How to Design a PKI System},
 year = {1999}
}