1 |
R.Housley, Russ, 'Best Parctices Guide for Deploying Public Key Infrastructure', Wiley, 2001
|
2 |
Y. Elley, A. Andeison, S. Hanna, S. Mullan, R. Perlman and S. Proctor, 'Building Certification Paths : Forward vs.Reverse', In Network and Distributed System Security Symposium Conference Proceedings, 2001
|
3 |
D. Pinkas and R. Housley, 'Delegated Path Validation and Delegated Path Discovery Protocol Requirements', IETF RFC 3379, September 2002
|
4 |
Eric A. Yong and Tim J. Hudson, OPENSSL toolkit, http://www.openssl.org
|
5 |
Peter M. Hesse and David P. Lemire, 'Managing Interoperability in Non-Hierarchical Public Key Infrastructures', In Network and Distributed System Security Symposium Conference Proceedings, 2002
|
6 |
R. Housley, W. Polk, W.Ford, D. Solo, 'Internet X.509 Public Key Infrastructure Certificate and CRL Profile', IETF RFC 3280, January 2002
|
7 |
황보성, '서버 기반 인증서 검증', http://www.rootca.or.kr/down/downl/Server%20Based%20Certificate%20Validation.pdf'
|
8 |
유종덕, 이주남, 이구연, 'Enterprise PKI에서의 고속 인증 경로 탐색 알고리즘의 설계 및 구현', 정보 보호 학획 논문지. 제 2권, 제 2호, 2002년 4월
|