Mostra el registre d'ítem simple

dc.contributor.authorGañán, Carlos
dc.contributor.authorMata Diaz, Jorge
dc.contributor.authorMuñoz Tapia, José Luis
dc.contributor.authorEsparza Martín, Óscar
dc.contributor.authorAlins Delgado, Juan José
dc.contributor.otherUniversitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica
dc.date.accessioned2013-06-20T15:51:09Z
dc.date.created2012
dc.date.issued2012
dc.identifier.citationGañán, C. [et al.]. On the self-similarity nature of the revocation data. A: International Conference on Information Security. "Information Security and Cryptology: ICISC 2012: 15th International Conference, Seoul, Korea, November 28-30, 2012: revised selected papers". Seoul: Springer, 2012, p. 387-400.
dc.identifier.isbn978-3-642-37681-8
dc.identifier.urihttp://hdl.handle.net/2117/19600
dc.description.abstractOne of the hardest tasks of a Public Key Infrastructure (PKI) is to manage revocation. Different revocation mechanisms have been proposed to invalidate the credentials of compromised or misbe- having users. All these mechanisms aim to optimize the transmission of revocation data to avoid unnecessary network overhead. To that end, they establish release policies bas ed on the assumption that the revoca- tion data follows uniform or Poisson distribution. Temporal distribution of the revocation data has a significant influence on the performance and scalability of the revocation service. In this paper, we demonstrate that the temporal distribution of the daily number of revoked certificates is statistically self-similar, and that the currently assumed Poisson distribu- tion does not capture the statistical properties of the distribution. None of the commonly used revocation models takes into account this fractal behavior, though such behavior has serious implications for the design, control, and analysis of revocation protocols such as CRL or delta-CRL.
dc.format.extent14 p.
dc.language.isoeng
dc.publisherSpringer
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 Spain
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/es/
dc.subjectÀrees temàtiques de la UPC::Informàtica::Seguretat informàtica::Criptografia
dc.subject.lcshComputer security
dc.subject.lcshData encryption (Computer science)
dc.subject.otherCertification
dc.subject.otherPublic Key Infrastructure
dc.subject.otherRevocation
dc.subject.otherSelf-similarity
dc.titleOn the self-similarity nature of the revocation data
dc.typeConference report
dc.subject.lemacSeguretat informàtica
dc.subject.lemacXifratge (Informàtica)
dc.contributor.groupUniversitat Politècnica de Catalunya. SERTEL - Serveis Telemàtics
dc.identifier.doi10.1007/978-3-642-33383-5_24
dc.description.peerreviewedPeer Reviewed
dc.relation.publisherversionhttp://download.springer.com/static/pdf/282/chp%253A10.1007%252F978-3-642-33383-5_24.pdf?auth66=1351867066_e256b183a7b2c1f99b71a3a674631542&ext=.pdf
dc.rights.accessRestricted access - publisher's policy
local.identifier.drac11025353
dc.description.versionPostprint (published version)
dc.date.lift10000-01-01
local.citation.authorGañán, C.; Mata, J.; Muñoz, J.; Esparza, O.; Alins, J.
local.citation.contributorInternational Conference on Information Security
local.citation.pubplaceSeoul
local.citation.publicationNameInformation Security and Cryptology: ICISC 2012: 15th International Conference, Seoul, Korea, November 28-30, 2012: revised selected papers
local.citation.startingPage387
local.citation.endingPage400


Fitxers d'aquest items

Imatge en miniatura

Aquest ítem apareix a les col·leccions següents

Mostra el registre d'ítem simple