Risk-based decision-making for public key infrastructures using fuzzy logic
View/Open
ijicic-ksi-07.pdf (669,9Kb) (Restricted access)
Request copy
Què és aquest botó?
Aquest botó permet demanar una còpia d'un document restringit a l'autor. Es mostra quan:
- Disposem del correu electrònic de l'autor
- El document té una mida inferior a 20 Mb
- Es tracta d'un document d'accés restringit per decisió de l'autor o d'un document d'accés restringit per política de l'editorial
Document typeArticle
Defense date2012-11-01
Rights accessRestricted access - publisher's policy
Abstract
Public key infrastructures (PKIs) are complex systems that are responsible for giving users enough information to make reasonable trust judgments about one another. The validation of public keys is hence of great importance. In general, validation of public keys is achieved by public-key certificates. However, in some circumstances certificates have to be revoked. Certificate revocation is generally achieved using Certificate Revocation Lists (CRLs) but the use of CRLs implicitly entails the risk of trusting a certificate that is not included in the list. This can be because the actual status of the certificate is unknown to the CA, or because the CRL is not updated. In this context, in this article we propose a fuzzy risk-based decision making system to assist any network user to make easier its decision-making process when using CRLs.
CitationHernandez, C. [et al.]. Risk-based decision-making for public key infrastructures using fuzzy logic. "International journal of innovative computing information and control", 1 Novembre 2012, vol. 8, núm. 11, p. 7925-7942.
ISSN1349-4198
Publisher versionhttp://www.ijicic.org/ijicic-ksi-07.pdf
Files | Description | Size | Format | View |
---|---|---|---|---|
ijicic-ksi-07.pdf![]() | 669,9Kb | Restricted access |
All rights reserved. This work is protected by the corresponding intellectual and industrial
property rights. Without prejudice to any existing legal exemptions, reproduction, distribution, public
communication or transformation of this work are prohibited without permission of the copyright holder