Mostra el registre d'ítem simple
On the self-similarity nature of the revocation data
dc.contributor.author | Gañán, Carlos |
dc.contributor.author | Mata Diaz, Jorge |
dc.contributor.author | Muñoz Tapia, José Luis |
dc.contributor.author | Esparza Martín, Óscar |
dc.contributor.author | Alins Delgado, Juan José |
dc.contributor.other | Universitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica |
dc.date.accessioned | 2013-06-20T15:51:09Z |
dc.date.created | 2012 |
dc.date.issued | 2012 |
dc.identifier.citation | Gañán, C. [et al.]. On the self-similarity nature of the revocation data. A: International Conference on Information Security. "Information Security and Cryptology: ICISC 2012: 15th International Conference, Seoul, Korea, November 28-30, 2012: revised selected papers". Seoul: Springer, 2012, p. 387-400. |
dc.identifier.isbn | 978-3-642-37681-8 |
dc.identifier.uri | http://hdl.handle.net/2117/19600 |
dc.description.abstract | One of the hardest tasks of a Public Key Infrastructure (PKI) is to manage revocation. Different revocation mechanisms have been proposed to invalidate the credentials of compromised or misbe- having users. All these mechanisms aim to optimize the transmission of revocation data to avoid unnecessary network overhead. To that end, they establish release policies bas ed on the assumption that the revoca- tion data follows uniform or Poisson distribution. Temporal distribution of the revocation data has a significant influence on the performance and scalability of the revocation service. In this paper, we demonstrate that the temporal distribution of the daily number of revoked certificates is statistically self-similar, and that the currently assumed Poisson distribu- tion does not capture the statistical properties of the distribution. None of the commonly used revocation models takes into account this fractal behavior, though such behavior has serious implications for the design, control, and analysis of revocation protocols such as CRL or delta-CRL. |
dc.format.extent | 14 p. |
dc.language.iso | eng |
dc.publisher | Springer |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 Spain |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/es/ |
dc.subject | Àrees temàtiques de la UPC::Informàtica::Seguretat informàtica::Criptografia |
dc.subject.lcsh | Computer security |
dc.subject.lcsh | Data encryption (Computer science) |
dc.subject.other | Certification |
dc.subject.other | Public Key Infrastructure |
dc.subject.other | Revocation |
dc.subject.other | Self-similarity |
dc.title | On the self-similarity nature of the revocation data |
dc.type | Conference report |
dc.subject.lemac | Seguretat informàtica |
dc.subject.lemac | Xifratge (Informàtica) |
dc.contributor.group | Universitat Politècnica de Catalunya. SERTEL - Serveis Telemàtics |
dc.identifier.doi | 10.1007/978-3-642-33383-5_24 |
dc.description.peerreviewed | Peer Reviewed |
dc.relation.publisherversion | http://download.springer.com/static/pdf/282/chp%253A10.1007%252F978-3-642-33383-5_24.pdf?auth66=1351867066_e256b183a7b2c1f99b71a3a674631542&ext=.pdf |
dc.rights.access | Restricted access - publisher's policy |
local.identifier.drac | 11025353 |
dc.description.version | Postprint (published version) |
dc.date.lift | 10000-01-01 |
local.citation.author | Gañán, C.; Mata, J.; Muñoz, J.; Esparza, O.; Alins, J. |
local.citation.contributor | International Conference on Information Security |
local.citation.pubplace | Seoul |
local.citation.publicationName | Information Security and Cryptology: ICISC 2012: 15th International Conference, Seoul, Korea, November 28-30, 2012: revised selected papers |
local.citation.startingPage | 387 |
local.citation.endingPage | 400 |