• 综合性科技类中文核心期刊
    • 中国科技论文统计源期刊
    • 中国科学引文数据库来源期刊
    • 中国学术期刊文摘数据库(核心版)来源期刊
    • 中国学术期刊综合评价数据库来源期刊
ZHANG Han, ZHANG Jian-biao, ZHANG Tao. Certificate Distribution Deposition Model Based on DHT Network[J]. Journal of Beijing University of Technology, 2012, 38(3): 385-389.
Citation: ZHANG Han, ZHANG Jian-biao, ZHANG Tao. Certificate Distribution Deposition Model Based on DHT Network[J]. Journal of Beijing University of Technology, 2012, 38(3): 385-389.

Certificate Distribution Deposition Model Based on DHT Network

More Information
  • Received Date: March 09, 2010
  • Available Online: November 02, 2022
  • To solve single point failture,this paper proposes a distributed certificate storage system by using DHT.The robustness and failure tolerance of the distributed hash table (DHT) network can provide an extremely stable storage for certification,distribution,and cancellation.In this circumstance,the user can obtain and verify the certificate that he needs,even all servers are off-line.
  • [1]
    PARK Heesun,REDFORD Stan.Client certificate and IPaddress based multi-factor authentication for J2EE Webapplications[C/OL]∥Proceedings of the 2007 Conferenceof the Center for Advanced Studies on CollaborativeResearch.New York:ACM Publish,2007:167-174.
    [2]
    HUANG Jing-wei,NICOL David.A calculus of trust and itsapplication to PKI and identity management[C/OL]∥IDtrust.New York:ACM Publish,2009:23-37.
    [3]
    GAMMUTO M, MARTELLI S, TROZZI C L, et al. A simulation environment for estimation of the performance of RSA cages [J]. Russo Computers in Biology and Medicine, 2008, 38: 33-36.
    [4]
    GANESH Arul,GOPINATH K.SPKI/SDSI certificate chaindiscovery with generic constraints[C/OL]∥Compute'08:Proceedings of the 1st Bangalore Annual ComputeConference.New York:ACM Publish,2008:1-8.
    [5]
    HUANG Chin-tser,GERDES John H,Jr.Privacy-preserving multi-dimensional credentialing using veiledcertificates[C/OL]∥Proceedings of the 5th AnnualWorkshop on Cyber Security and Information IntelligenceResearch:Cyber Security and Information IntelligenceChallenges and Strategies.New York:ACM Publish,2009:1-4.
    [6]
    JASON J Haas,HU Yih-chun,LABERTEAUX KennethP.Design and analysis of a lightweight certificaterevocation mechanism for VANET[C/OL]∥VANET'09:Proceedings of the Sixth ACM International Workshop onVehicular Internetworking.New York:ACM Publish,2009:89-98.
    [7]
    STEPHEN Wilson.Public key superstructure“it's PKIJim,but not as we know it!”[C/OL]∥IDtrust'08:Proceedings of the 7th Symposium on Identity and Trust onthe Internet.New York:ACM Publish,2008:72-88.
    [8]
    GUTMANN Peter.PKI design for the real world[C/OL]∥NSPW'06:Proceedings of the 2006 Workshop on NewSecurity Paradigms.New York:ACM Publish,2006:109-116.
    [9]
    REN Wei,REN Kui,LOU Wen-jing,et al.Efficient userrevocation for privacy-aware PKI[C/OL]∥QShine'08:Proceedings of the 5th International ICST Conference onHeterogeneous Networking for Quality,Reliability,Securityand Robustness.New York:ACM Publish,2008:1-7.
  • Related Articles

    [1]ZHANG Yanxin, KONG Han, YIN Chenkun, WANG Zihao, HUANG Zhiqing. Distributed Multi-agent Soft Actor-Critic Algorithm With Probabilistic Prioritized Experience Replay[J]. Journal of Beijing University of Technology, 2023, 49(4): 459-466. DOI: 10.11936/bjutxb2022110019
    [2]LI Wei, CHEN Yangzhou, GUO Yuqi. Distributed Coordination Ramp Control for the Urban Freeway Network[J]. Journal of Beijing University of Technology, 2017, 43(10): 1535-1544. DOI: 10.11936/bjutxb2016110042
    [3]DONG Li-yan, HUANG Le, WANG Li-min, MAO Rui, YIN Han. Improved Strategy of Distributed System's Load Balancing[J]. Journal of Beijing University of Technology, 2011, 37(12): 1903-1906.
    [4]FU Yu, XU Tao, DING Jian-li, WANG Hong. Intelligent-agent Oriented Modeling for Complex Distributed Systems[J]. Journal of Beijing University of Technology, 2011, 37(6): 955-960.
    [5]SU Yi-la, LIU Chun-nian. Application of β-PSML in the Distributed Environment of WI[J]. Journal of Beijing University of Technology, 2011, 37(2): 260-265.
    [6]JIN Yu-han, LIU Ze-min. Organizing Mechanisms for Distributed Terminal System[J]. Journal of Beijing University of Technology, 2009, 35(4): 555-560.
    [7]MA Jun, ZHU Heng-jun, HAN Jing-yun, YE Hong-ling. Distributed Rendering Method of Virtual Avatar in Mobile Virtual Reality[J]. Journal of Beijing University of Technology, 2007, 33(10): 1033-1037.
    [8]ZHANG Xiao-yang, HUO Da, DAI Chun-sheng. Concept, Prototype and Characteristics of Distributed Urban[J]. Journal of Beijing University of Technology, 2003, 29(3): 309-314.
    [9]JIA Ke-bin, DUN Shu-bo, WU Yong, CHANG Wu. Research of Architecture of PACS Based on Technique of Distributed Object[J]. Journal of Beijing University of Technology, 2002, 28(4): 426-429.
    [10]MI Jie. Design and Implement of Distributed Component in PDM System[J]. Journal of Beijing University of Technology, 2001, 27(3): 312-315.

Catalog

    Article views (11) PDF downloads (5) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return