The expansibility of PKI is expected to have the features that when the amount of user exceeds the system capacity, the users’ requirement can still be met by simply expanding the number of PKI entities and managemen...The expansibility of PKI is expected to have the features that when the amount of user exceeds the system capacity, the users’ requirement can still be met by simply expanding the number of PKI entities and management levels, and this expansion should be achieved smoothly from the original system. The upward, downward, and horizontal expansions of PKI are discussed in this paper. A path discovery method is suggested to reduce the effect of PKI expansion to the end entities, so as to enhance the availbility of PKI services.展开更多
In the manufacturing grid environment, the span of the consideration of security issues is more extensive, and the solutions for them are more complex, therefore these problems in manufacturing grid can't longer be a...In the manufacturing grid environment, the span of the consideration of security issues is more extensive, and the solutions for them are more complex, therefore these problems in manufacturing grid can't longer be addressed by existing security technologies. In order to solve this problem, the paper first puts forward the security architecture of manufacturing grid on the basis of the proposal of the security strategies for manufacturing grid; then the paper introduces key technologies based on public key infrastructure-certificate authority (PKI/CA) to ensure the security of manufacturing grid, such as single sign-on, security proxy, independent authentication and so on. Schemes discussed in the paper have some values to settle security problems in the manufacturing grid environment.展开更多
With the development of the wireless network technology, the wireless band becomes more and more wide, and the development of the microelec-tronic technology has also improved the computati-onal speed and memory capac...With the development of the wireless network technology, the wireless band becomes more and more wide, and the development of the microelec-tronic technology has also improved the computati-onal speed and memory capacity of the mobile devices. They brought the infinite prospects for the wireless mobile e-commerce. However security is key to lau-nching mobile e-business. Public key infrastructure(PKI) can satisfy mobile e-business security’s requirement. The suitable asymmetrical encryption and signature algorithm were selected, and simply SSL so that PKI can provide better secure information between client and client server.展开更多
A Scheme is introduced in this paper on integration of VPN and PKI. Techniques concerning authentication and data package in VPN, and cross-certification in PKI are described. With the employment of PKI and CA, the ne...A Scheme is introduced in this paper on integration of VPN and PKI. Techniques concerning authentication and data package in VPN, and cross-certification in PKI are described. With the employment of PKI and CA, the network security and key management in VPN are improved. The integration is transparent to the users and cost-effective in setting up and maintaining a VPN.展开更多
文摘The expansibility of PKI is expected to have the features that when the amount of user exceeds the system capacity, the users’ requirement can still be met by simply expanding the number of PKI entities and management levels, and this expansion should be achieved smoothly from the original system. The upward, downward, and horizontal expansions of PKI are discussed in this paper. A path discovery method is suggested to reduce the effect of PKI expansion to the end entities, so as to enhance the availbility of PKI services.
基金Supported by the National Natural Science Foun-dation of China (50335020)
文摘In the manufacturing grid environment, the span of the consideration of security issues is more extensive, and the solutions for them are more complex, therefore these problems in manufacturing grid can't longer be addressed by existing security technologies. In order to solve this problem, the paper first puts forward the security architecture of manufacturing grid on the basis of the proposal of the security strategies for manufacturing grid; then the paper introduces key technologies based on public key infrastructure-certificate authority (PKI/CA) to ensure the security of manufacturing grid, such as single sign-on, security proxy, independent authentication and so on. Schemes discussed in the paper have some values to settle security problems in the manufacturing grid environment.
文摘With the development of the wireless network technology, the wireless band becomes more and more wide, and the development of the microelec-tronic technology has also improved the computati-onal speed and memory capacity of the mobile devices. They brought the infinite prospects for the wireless mobile e-commerce. However security is key to lau-nching mobile e-business. Public key infrastructure(PKI) can satisfy mobile e-business security’s requirement. The suitable asymmetrical encryption and signature algorithm were selected, and simply SSL so that PKI can provide better secure information between client and client server.
文摘A Scheme is introduced in this paper on integration of VPN and PKI. Techniques concerning authentication and data package in VPN, and cross-certification in PKI are described. With the employment of PKI and CA, the network security and key management in VPN are improved. The integration is transparent to the users and cost-effective in setting up and maintaining a VPN.