Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

A solution to open standard of PKI

  • Conference paper
  • First Online:

Part of the book series:Lecture Notes in Computer Science ((LNCS,volume 1438))

Included in the following conference series:

Abstract

PKI (Public Key Infrastructure) is fundamental for many security applications on the network. However, there are so many different kinds of PKI at current stage and they are not compatible. To solve the problem, we propose to implement the authority of authentication verification service systems as personal autonomous software agents, called security agents. In this paper, we introduce its concept and architecture, as well as its communication language, which is needed for public key management and secure communications among security agents and application agents.

This is a preview of subscription content,log in via an institution to check access.

Access this chapter

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. W. Timothy Polk, Donna F. Dodson, etc,Public Key Infrastructure: From Theory to Implementation, http://csrc.ncsl.nist.gov/pki/panel/overview.html, NIST.

    Google Scholar 

  2. URL,Public-Key Infrastructure (X.509) (pkix), http://www.ietf.org/html.charters/pkix-charter.html

    Google Scholar 

  3. URL,RSA Laboratories, PKCS (Public Key Crypto System) http://www.rsa.com/rsalabs/pubs/PKCS/

    Google Scholar 

  4. Philip R. Zimmermann,The Official PGP User's Guide MIT Press 1995.

    Google Scholar 

  5. Carl M. Ellison, Bill Frantz, Butler Lampson, Ron Rivest, Brian M. Thomas, Tatu Ylonen,Simple Public Key Certificate, http://www.clark.net/pub/cme/spki.txt

    Google Scholar 

  6. Ronald L. Rivest, Butler Lampson,SDSI — A Simple Distributed Security Infrastructure, http://theory.lcs.mit.edu/ cis/sdsi.html

    Google Scholar 

  7. Matt Blaze, Joan Feigenbaum, Jack Lacy,Decentralized Trust Management, In Proceedings 1996 IEEE Symposium on Security and Privacy, May, 1996.

    Google Scholar 

  8. Tim Finin, James Mayfield, Chelliah Thirunavukkarasu,Secret Agents — A Security Architecture for the KQML Agent Communication Language, CIKM'95 Intelligent Information Agents Workshop, Baltimore, December 1995.

    Google Scholar 

  9. Leonard N. Foner,A Security Architecture for Multi-Agent Matchmaking, Proceeding of Second International Conference on Multi-Agent System, Mario Tokoro, 1996.

    Google Scholar 

  10. Tim Finin, Yannis Labrou, and James Mayfield,KQML as an agent communication language, in Jeff Bradshaw (Ed.), “Software Agents”, MIT Press, Cambridge (1997).

    Google Scholar 

  11. Sycara, K., Decker, K, Pannu, A., Williamson, M and Zeng, D.,Distributed Intelligent Agents, IEEE Expert, pp.36–45, December 1996.

    Google Scholar 

  12. Qi He, Katia P. Sycara, and Timothy W. Finin,Personal Security Agent: KQML-Based PKI, to appear in Autonomous Agents'98, Minneapolis/St. Paul, May 10–13, 1998.

    Google Scholar 

  13. R. Anderson and R. NeedhamRobustness Principles for Public Key Protocols,Lecture Notes on Computer Science, 963:236–247, 1995.

    Article MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. The Robotics Institute, Carnegie Mellon University, 15213, Pittsburgh, PA, USA

    Qi He & Katia Sycara

  2. Dept. of CS and Telecommunications, University of Missouri-Kansas, 64110, City Kansas, MO, USA

    Zhongmin Su

Authors
  1. Qi He

    You can also search for this author inPubMed Google Scholar

  2. Katia Sycara

    You can also search for this author inPubMed Google Scholar

  3. Zhongmin Su

    You can also search for this author inPubMed Google Scholar

Editor information

Colin Boyd Ed Dawson

Rights and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

He, Q., Sycara, K., Su, Z. (1998). A solution to open standard of PKI. In: Boyd, C., Dawson, E. (eds) Information Security and Privacy. ACISP 1998. Lecture Notes in Computer Science, vol 1438. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0053725

Download citation

Publish with us


[8]ページ先頭

©2009-2025 Movatter.jp