{"title":"信标证书推送撤销","authors":"Jon A. Solworth","doi":"10.1145/1456508.1456519","DOIUrl":null,"url":null,"abstract":"Authentication information is best localized. Local sources of authentication information are better able to physically identify users, provide authoritative information on them, adequately protect authentication information and infrastructure, and ato provide high quality authentication at an affordable cost.\n We consider here the problem of public key authentication using a potentially large number of local Certificate Authorities (CAs). The information provided by these CAs is federated together to create a large-scale distributed authentication base. One of the key problems in doing so is certificate revocation. Efficient mechanisms are described for certificate revocation when there are many CAs and we provide some measures on their efficiency.","PeriodicalId":121387,"journal":{"name":"Workshop on Computer Security Architecture","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Beacon certificate push revocation\",\"authors\":\"Jon A. Solworth\",\"doi\":\"10.1145/1456508.1456519\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Authentication information is best localized. Local sources of authentication information are better able to physically identify users, provide authoritative information on them, adequately protect authentication information and infrastructure, and ato provide high quality authentication at an affordable cost.\\n We consider here the problem of public key authentication using a potentially large number of local Certificate Authorities (CAs). The information provided by these CAs is federated together to create a large-scale distributed authentication base. One of the key problems in doing so is certificate revocation. Efficient mechanisms are described for certificate revocation when there are many CAs and we provide some measures on their efficiency.\",\"PeriodicalId\":121387,\"journal\":{\"name\":\"Workshop on Computer Security Architecture\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-10-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Workshop on Computer Security Architecture\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/1456508.1456519\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Workshop on Computer Security Architecture","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1456508.1456519","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Authentication information is best localized. Local sources of authentication information are better able to physically identify users, provide authoritative information on them, adequately protect authentication information and infrastructure, and ato provide high quality authentication at an affordable cost.
We consider here the problem of public key authentication using a potentially large number of local Certificate Authorities (CAs). The information provided by these CAs is federated together to create a large-scale distributed authentication base. One of the key problems in doing so is certificate revocation. Efficient mechanisms are described for certificate revocation when there are many CAs and we provide some measures on their efficiency.