Call for Paper - September 2020 Edition
IJCA solicits original research papers for the September 2020 Edition. Last date of manuscript submission is August 20, 2020. Read More

PKI Endorsement Functions for Network users

Print
PDF
Computational Science - New Dimensions & Perspectives
© 2011 by IJCA Journal
Number 3 - Article 3
Year of Publication: 2011
Authors:
Sreekanth D

Sreekanth D. PKI Endorsement Functions for Network users. IJCA Special Issue on Computational Science - New Dimensions & Perspectives (3):104–107, 2011. Full text available. BibTeX

@article{key:article,
	author = {Sreekanth D},
	title = {PKI Endorsement Functions for Network users},
	journal = {IJCA Special Issue on Computational Science - New Dimensions & Perspectives},
	year = {2011},
	number = {3},
	pages = {104--107},
	note = {Full text available}
}

Abstract

Computer Business Systems and automated business transactions require robust and rigorous security measures. Public key cryptography supports security mechanisms such as confidentiality, integrity, authentication and non-repudiation. A Public Key Infrastructure (PKI) is a foundation on which other applications, systems and Network components are built.

Gatefree is a user endorsement gateway system network which is opened to public. This system can be used for controlling the campus wide open network. In this research, we implemented PKI endorsement functions for Network Users, and we enabled the certificate based endorsement via a web browser.

Reference

  • “Solution and Problems: (Why) It’s a long Way toInteroperability”, Jürgen Schwemmer, Datenschutz und Datensicherheit, No.9, 2001 (September 2001).
  • “PKI: An Insider View”, Ben Rothke, Information Security Magazine, October 2001.
  • “OpenPGP Message Format”, RFC 2440, Jon Callas, Lutz Donnerhacke, Hal Finney, and Rodney Thayer, November 1998.
  • “SPKI Certificate Theory”, RFC 2693, Carl Ellison, Bill Frantz, Butler Lampson, Ron Rivest, Brian Thomas, and Tatu Ylönen, September 1999.
  • “Identity-Based Cryptosystems and Signature Schemes”, Adi Shamir, Proceedings of Crypto'84,
  • “Cryptography: A New Dimension in Computer Data Security”, Carl Meyer and Stephen Matyas, John Wiley & Sons, 1982.
  • “New Directions in Cryptography”, Whitfield Diffie and Martin Hellman, IEEE Transactions on Information Theory, Vol.22, No.6 (November 1976), p.644.
  • “Security for Computer Networks : An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer”, Donald Davies and W.Price, John Wiley and Sons, 1984.
  • “Replacing the Whois Protocol”, Andrew Newton,IEEE Internet Computing, Vol.10, No.4(July/August 2006), p.79.116