Show simple item record

dc.contributor.authorHernández Gañán, Carlos
dc.contributor.authorMata Diaz, Jorge
dc.contributor.authorMuñoz Tapia, José Luis
dc.contributor.authorHernández Serrano, Juan
dc.contributor.authorEsparza Martín, Óscar
dc.contributor.authorAlins Delgado, Juan José
dc.contributor.otherUniversitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica
dc.date.accessioned2012-09-26T09:21:41Z
dc.date.created2012
dc.date.issued2012
dc.identifier.citationGañán, C. [et al.]. A modeling of certificate revocation and its application to synthesis of revocation traces. "IEEE transactions on information forensics and security", 2012.
dc.identifier.issn1556-6013
dc.identifier.urihttp://hdl.handle.net/2117/16578
dc.description.abstractOne of the hardest tasks of a public key infrastructure (PKI) is to manage revocation. New communication paradigms push the revocation system to the limit and an accurate resource assessment is necessary before implementing a particular revocation distribution system. In this context, a precise modeling of certificate revocation is necessary. In this article, we analyze empirical data from real CAs to develop an accurate and rigorous model for certificate revocation. One of the key findings of our analysis is that the certificate revocation process is statistically self-similar. The proposed model is based on an autoregressive fractionally integrated moving average (ARFIMA) process. Then, using this model, we show how to build a synthetic revocation generator that can be used in simulations for resource assessment. Finally, we also show that our model produces synthetic revocation traces that are indistinguishable for practical purposes from those corresponding to actual revocations.
dc.language.isoeng
dc.subjectÀrees temàtiques de la UPC::Enginyeria de la telecomunicació::Telemàtica i xarxes d'ordinadors::Serveis telemàtics i de comunicació multimèdia
dc.subject.lcshComputer security
dc.titleA modeling of certificate revocation and its application to synthesis of revocation traces
dc.typeArticle
dc.subject.lemacSeguretat informàtica
dc.contributor.groupUniversitat Politècnica de Catalunya. SERTEL - Serveis Telemàtics
dc.description.peerreviewedPeer Reviewed
dc.rights.accessRestricted access - publisher's policy
local.identifier.drac10654348
dc.description.versionPostprint (author’s final draft)
dc.date.lift10000-01-01
local.citation.authorGañán, C.; Mata, J.; Muñoz, J.; Juan Hernández Serrano; Esparza, O.; Alins, J.
local.citation.publicationNameIEEE transactions on information forensics and security


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

All rights reserved. This work is protected by the corresponding intellectual and industrial property rights. Without prejudice to any existing legal exemptions, reproduction, distribution, public communication or transformation of this work are prohibited without permission of the copyright holder