Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Ordnance Industry Automation》 2003-06
Add to Favorite Get Latest Update

Summarization on PKI/CA Technology

JIANG Wei-qiang, CHEN Bo (College of Computer Science and Technology, Southwest University of Science and Technology, Mianyang 621002, China)  
Public key infrastructure (PKI) is one of the important techniques for solving network security problem. The typical PKI application system includes security Web server, registration Authority (RA) server, certificate Authority (CA) server, LDAP server and database server. After validated the requisition from user, RA submits it to CA. Then CA creates certification and puts it into the certification database and LDAP database after the integrity of RAs requisition and the legitimacy of RAs signature is certified. America, Canada, Europe, korea and Japan have made scientific researches on PKI successively since 1993. China have ranked PKI as the 15th 863 Program in 2001 and set about to solve the problem of the PKI standardization and the critical technique of interlink and communication of CAs.
【Fund】: 缩小数字鸿沟-西部行动 国家863基金项目(2003AA1198206)
【CateGory Index】: TN918.6
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 5 Hits
1 ZHONG Qiu-yan~(*1),LI Yan~2(1.School of Manage.,Dalian Univ.of Technol.,Dalian 116024,China;2.College of Int.Bus.,Shanghai Int.Studies Univ.,Shanghai 200083,China);Construction of multilevel bridge CA model and design of its LDAP server[J];Journal of Dalian University of Technology;2006-04
2 ZHONG Qiuyan,WANG Yuehong(School of Management,Dalian University of Technology,Dalian 116023);Research and Implementation of LDAP-based XKMS Service[J];Computer Engineering;2007-05
3 ZHANG Wan-bin(Jiangxi Institute of Computing Technology,Nanchang 330002,China);Design of CA System[J];Computer and Modernization;2008-12
4 WANG Gong-ming1,2,GUAN Yong1,ZHAO Chun-jiang2,WU Hua-rui2(1.College of Information Engineering,Capital Normal University,Beijing 100037,China;2.National Engineering Research Center for Information Technology in Agriculture,Beijing 100089,China);Framework and research of believable network[J];Computer Engineering and Design;2007-05
5 YIN Shao-feng(Department of Computer Science and Technology,Tsinghua University,shenyang,shenyang,110016,China)(Graduate School of the Chinese Academy of Sciences,beijing,100080,China);The Self-Control Model of Believable Network[J];Microcomputer Information;2010-24
【Citations】
Chinese Journal Full-text Database 1 Hits
1 Xiao Ling Li Zhitang(College of Computer,Huazhong University of Science and Technology,Wuhan430074);Architecture of PKI[J];Computer Engineering and Applications;2002-10
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 Suo Hui (GuangDong Vocational College of Mechanical & Electrical technology Guangzhou 510515);Application of digital multisignature in OA System[J];Office Automation;2006-04
2 LU Rong-jie, LIU Zhi-gui, HUANG Xiao-fang (College of Computer Science, Southwest University of Science & technology, Mianyang 621002, China);J2EE Security Authentication of Web Client-Side Based on Container Management[J];Ordnance Industry Automation;2005-03
3 LONG Xue-feng, XING Jia(Media Management School, Beijing Broadcasting Institute, Beijing 100024,P.R. China);The Safe Problem of the Information Ages[J];Journal of Beijing Broadcasting Institute;2004-03
4 CHEN Tian hua (College of Information Engineering, Beijing Technology and Business University, Beijing 100037, China);NETWORK SECURITY TECHNOLOGY BASED ON PKI[J];Journal of Beijing Institute of Light Indusry;2002-03
5 GUO Jing,CHEN Yi(College of Computer Science and Technology,Beijing Technology and Business University,Beijing 100037,China);DESIGN AND REALIZATION OF CA SERVER IN PKI SYSTEM[J];Journal of Beijing Technology and Business University(Natural Science Edition);2006-05
6 TONG Guang-cai (Chongqing Jiaotong University, Chongqing 400074, P. R. China);Application of nesting encryption technologies in SET[J];Journal of Chongqing University of Posts and Telecommunications(Natural Science);2006-S1
7 ;PKI技术的应用及思考[J];Journal of Chengdu Electromechanical College;2006-04
8 ZHANG Yuan-mao,LIU Di(College of Computer Science & Engineering, UESTC, Chengdu 610054, China);Function model of RA in PKI and its implementation[J];Journal of Chengdu University of Information Technology;2005-01
9 CUI Wei,LI An-zhi,XU Yong-hong(CAEP Institute of Technology, Mianyang 621900, China);A realization of signature project based on B/S project[J];Journal of Chengdu University of Information Technology;2005-03
10 WANG Zhe-kun,TANG Yun-ge (Army Unit 63880,Loyang 471003,China);A new type of designed methodology about PKI trust chain[J];Journal of Chengdu University of Information Technology;2007-05
China Proceedings of conference Full-text Database 7 Hits
1 Economics Information Center of Guangxi Province Li Chenglin Hu Yingxue;The application of PKI in E-Government of Guangxi Development and Reform Commission[A];[C];2004
2 Yao Xin Qin Guangdong AIB Polytechnic College,510507 Guangzhou;A Cryptology Model Based on Elliptic Curves[A];[C];2008
3 CHENG Li-hong ZHANG Hai-xin LI Shun-dong (School of Computer Science,Shaanxi Normal University of China,Xi'an 710062,China);Analysis for Several Problems in the RSA Secure Application[A];[C];2009
4 LIU Gang, LIANG Ye, LI Yi-song, MA Xiao, WANG Wen, LI Bo, CHEN Gui-feng ( Electrical Power Research Institute of China, Haidian District, Beijing 100085; Power Dispatching Communication Center of State Grid, Xicheng District, Beijing 100031);Realization and Application of Certificate in Secondary Part Power System[A];[C];2006
5 YANG Rong-fang (.HeBei Province Meteorological Science and Technology Center );The design of the meteorological speech early-warning system on GSM[A];[C];2008
6 XUE Weimin~1 LIN Benjing~2 1 Department of Computer Science & Technology,Tsinghua University,Beijing 100089 2 College of Information,Beijing University of Chemical Technology,Beijing 100029;Research of Wireless Network Security Based on Status Authentication[A];[C];2008
7 Yao Xin Qin (Guangdong AIB Polytechnic College,510507 Guangzhou);An Improved Cryptology Model Based on Elliptic Curves[A];[C];2010
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 ZHANG Lei,QIAN Feng(Department of Computer,College of Tongling,Tongling 24400,China);A dynamic evaluating method of confidence within CA in PKI system[J];Journal of Anhui University(Natural Sciences);2006-05
2 XU Ji-bin~1,YE Zhen~1,CAI Min~2(1.School of Computer and Information,Hefei University of Technology,Hefei 230039,China;2.Department of Computer Science and Technology,Chaohu College,Chaohu 238000,China);A Key Management Scheme Based on HASH Function[J];Journal of Anhui Normal University(Natural Science);2006-04
3 MA Hai - ying (Liaoning University, Shenyang 110036, China);Design and Research of Certificate Authority in Public Key Infrastructure[J];Journal of Anyang University;2004-01
4 ZHANG Yu1, FEI Wen-xiao1, YU Bo2 (1. College of Computer, Southwest University of Science & Technology, Mianyang 621002, China; 2. College of Finance & Economics, Southwest University of Science & Technology, Mianyang 621002, China);Digital Certificate Based on PKI[J];Ordnance Industry Automation;2006-04
5 ZHANG Shu-jie, PAN Xing-qing, LI Jian (College of Computer Science, Beijing University of Technology, Beijing 100022, China; Bank of Beijing, Beijing 100031, China);Implementing a System of Online Transaction Between the Internet Banking and Fund Company Based on PKI/CA Technology[J];Journal of Beijing University of Technology;2006-05
6 WANG Da-kang, DU Hai-shan (College of Mechanical Engineering and Applied Electronics Technology, Beijing University of Technology, Beijing 100022, China);Encrypt & Crack Technology in Information Security[J];Journal of Beijing University of Technology;2006-06
7 YANG Ya\|ping\ LI Wei\|qin (Beijing University of Aeronautics and Astronautics, Dept. of Computer Science and Engineering);Design and Implementation of SSL Based Secure Transmission System[J];Journal of Beijing University of Aeronautics and Astronautics;2001-04
8 CHEN Tian hua (College of Information Engineering, Beijing Technology and Business University, Beijing 100037, China);NETWORK SECURITY TECHNOLOGY BASED ON PKI[J];Journal of Beijing Institute of Light Indusry;2002-03
9 ZHANG Yuan-mao,LIU Di(College of Computer Science & Engineering, UESTC, Chengdu 610054, China);Function model of RA in PKI and its implementation[J];Journal of Chengdu University of Information Technology;2005-01
10 GUO Qu1,2,HE Da-ke1(1.Information Security and National Computing Grid Laboratory,Southwest Jiaotong University,Chengdu 610031,China;2.China Tietong Nanning Branch,Nanning 530001,China);Analysis and Modification of a Private Key Protection Scheme[J];Telecommunication Engineering;2008-07
【Secondary References】
Chinese Journal Full-text Database 7 Hits
1 ZHANG Xiao-yan,ZHU Lan(Nanjing Communication Institute of Technology,Nanjing 211188,China);Discussion On the Raising of Practical Value of Campus Network[J];Journal of Nanjing Institute of Industry Technology;2009-02
2 ZHOU Yan-wei,WU Zhen-qiang,YE Jiang-cai,CHONG Hui-fang(School of Computer Science,Shaanxi Normal University,Xi'an Shaanxi 710062,China);Study of new trusted network framework[J];Journal of Computer Applications;2009-09
3 ZHANG Wan-bin (Jiangxi Institute of Computing Technology,Nanchang 330002,China);Design and Realization of Web Page Protection Program[J];Computer and Modernization;2009-11
4 ZHANG Wan-bin(Jiangxi Institute of Computing Technology,Nanchang 330002,China);Design and Realization of Web Processes Controlling Program[J];Computer and Modernization;2009-12
5 DENG Rui-zhi,ZHU Sheng-lin(College of Information,South China Agricultural University,Guangzhou 510642,China);Access Control Technology for Spatial Database[J];Computer and Modernization;2010-01
6 YANG Ya-tao1,LI Zi-chen1,YU Pei1,GUO Bao-an2,XU Shu-min2 (1.Beijing Electronic Science & Technology Institute,Beijing 100070,China;2.AISINO Co.Ltd.,Beijing 100195,China);Improved trusted network connect protocol to prevent middle attack[J];Application Research of Computers;2010-11
7 LI Hai-Ling1,2,3,WANG Wei1,2,MAO Wei1,2(1.Computer Network Information Center,Chinese Academy of Sciences,Beijing 100190,China;2.China Internet Network Information Center,Beijing 100190,China;3.Graduate University of Chinese Academy of Sciences,Beijing 100190,China);Anti-Phishing Method Based on Trustworthy Domain Names[J];Computer Systems & Applications;2010-10
【Secondary Citations】
Chinese Journal Full-text Database 1 Hits
1 Wang Lidong, Yu Xiangzhan, Fang Binxing (Dept. of Computer Science, Harbin institUte of Technology, Harbin 150001);Research on Several Security Problems in PKI[J];COMPUTER ENGINEERING;2000-01
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved