A modeling of certificate revocation and its application to synthesis of revocation traces
View/Open
06247505.pdf (800,1Kb) (Restricted access)
Request copy
Què és aquest botó?
Aquest botó permet demanar una còpia d'un document restringit a l'autor. Es mostra quan:
- Disposem del correu electrònic de l'autor
- El document té una mida inferior a 20 Mb
- Es tracta d'un document d'accés restringit per decisió de l'autor o d'un document d'accés restringit per política de l'editorial
Document typeArticle
Defense date2012
Rights accessRestricted access - publisher's policy
All rights reserved. This work is protected by the corresponding intellectual and industrial
property rights. Without prejudice to any existing legal exemptions, reproduction, distribution, public
communication or transformation of this work are prohibited without permission of the copyright holder
Abstract
One of the hardest tasks of a public key infrastructure (PKI) is to manage revocation. New
communication paradigms push the revocation system to the limit and an accurate resource assessment
is necessary before implementing a particular revocation distribution system. In this context, a precise
modeling of certificate revocation is necessary. In this article, we analyze empirical data from real
CAs to develop an accurate and rigorous model for certificate revocation. One of the key findings of
our analysis is that the certificate revocation process is statistically self-similar. The proposed model
is based on an autoregressive fractionally integrated moving average (ARFIMA) process. Then, using
this model, we show how to build a synthetic revocation generator that can be used in simulations
for resource assessment. Finally, we also show that our model produces synthetic revocation traces
that are indistinguishable for practical purposes from those corresponding to actual revocations.
CitationGañán, C. [et al.]. A modeling of certificate revocation and its application to synthesis of revocation traces. "IEEE transactions on information forensics and security", 2012.
ISSN1556-6013
Files | Description | Size | Format | View |
---|---|---|---|---|
06247505.pdf![]() | 800,1Kb | Restricted access |