Browse > Article
http://dx.doi.org/10.9708/jksci/2012.17.12.159

A study about the influence to the client system when using PKI-based authentication system  

Jeon, Jeong-Hoon (Dept. of Computer Science, Dongduk Women University)
Abstract
The authentication system of the PKI(public key infrastructure) provides the authenticity and security, accessibility, economic feasibility, and convenience to the service provider and users. Therefore the public and private companies in Korea widely use it as the authentication method of the web service. However, the safety client system is threatened by many vulnerable factors which possibly caused when using PKI-based authentication system. Thus, in this article vulnerable factors caused by using the PKI-based authentication system will be analyzed, which is expected to be the useful data afterwards for the construction of the new authentication system as well as performance improvement.
Keywords
PKI-based; Certificate-based Authentication; ActiveX Plug-in; Security Program;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Jeonghoon Han, "Analysis on Vulnerability of ID/PW Management Solution and Proposal of the Evaluation Criteria" Korea Information Processing Society Journal, vol 15, c, pp125- 132, 2008.4.   과학기술학회마을   DOI   ScienceOn
2 Telecommunications Technology Association of Korea "HTML5 Techniques for ActiveX Replacement" Telecommunications Technology Associations 2011.12.22
3 Jeon Jeong Hoon 11others "Cryptography & Network Security 5th", pp.283-347, Green 2011.
4 Broadcasting and Communications Commission Press release 2012.4.2.
5 Adams & Lloyd "Understanding Public-Key Infrastructure" Macmillan Technical Publishing, 1999.
6 National Cyber Security Center "ActiveX controls' at installation hacking vulnerabilities for Web Services" NCSC-TR050017
7 ITSTAT "Proportion of Internet banking transactions" http://www.itstat.go.kr/stat/graph View.htm?mclass_cd=JB3&detail=4
8 Su Yong Kim, Ki wook Sohn "The Study of technique to find and prove vulnerabilities in ActiveX Control", National Security Research Institute Vol. 15, No 6, pp.3-12, 2005.12
9 Jeon Jeong Hoon, "A Study of the Performance Degradation Factors of An Internal Network", Korea Institute of Communications and Information Sciences Vol. 36, No. 1, 2011.1   과학기술학회마을   DOI   ScienceOn
10 Richard E. Smith "Authentication" Addison-Wesley, 2002.
11 Kim Min Jea 4 others, "A Method for Vulnerability Analysis of ActiveX Modules for Internet Services using Fuzzing Techniques", Korea IT Industry Promotion Agency Conference vol.36, no.2(D). pp46-49, 2009.
12 KIPA "Electronic Payment 2.0 Payment 2.0 Market Trends" 2008.8
13 Kim, Boo Hyun , Yeo, Jungsung , "An Analysis of the Use of Cellular-phone's micro payment" Consumer policy and education review, Vol. 5, No. 2, pp.63-79, 2009.6.