Browse > Article

Algorithm of certificate security based-on using query language  

Lee, Chang-Jo (영산대학교 자유전공학부)
Publication Information
Abstract
Certificate security oriented cyber certificate is important tool for the purpose of offering user-authentication service based on on-line system. In the paper, we analyzed management implement which could make the efficient use of certificate security oriented cyber terror response. This algorithm called SOL(Security Oriented Language) will make efficient use of the service about authentication consisting of the basis in the age of information through efficient management and partial use of each certificates. Especially, SOL could be used efficiently by grafting a small group of on-line system which is operated with particular purposes.
Keywords
Certificate security; Certificate Algorithm;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 이창조,김상복 "차세대 사이버 인증 보안을 위한 알고리즘의 설계 및 구현에 관한 연구", 한국사이버테러정보전학회, 정보.보안 논문지, 제6권 제3호 pp.69-78, 2006.
2 Naomaru Itoi, Tomoko Fukuzawa, Peter Honeyman, "Secure Internet Smartcards", 2000.
3 Imprimerie Nationale : Projet de Loi de Finances pour 1995, Etat de la Recherche et du Developpe onent Technologique, Paris, 1994.
4 Qinzheng Kong, Graham Chen, Rubina Y. Hussain, "A Management Framework for Internet Services", Citr Technical Journal Vol.3. pp 47-55.
5 James D. Allen, Patrick T. Gaughan, David E. Schimmel, and S. Yalamanchili, "Ariadne -an adaptive router for fault- tolerant mulicomputers," Proceedings 23st Int'l Symp. on Computer Architecture, pp. 278-288, April. 1994.
6 J. Duato, P. Lopez, F. Silla and S. Yalamanchili, "A high performance router Architecture for interconnection networks," 1996 International Conference on Parallel Processing, pp. 61-68, 1996.
7 Marcus J.Ranum, "Thinking About Firewalls", Proceedings of Second International Conference on Systems and Network Security and Management, April, 1993.
8 M. Chatel, "Classicial versus Transparent IP Proxies", RFC:1919, Mar. 1996.
9 N.haller and C.Metz, "A One-Time Password System", IETF RFC 1938, 1996.
10 Phil Karn, Neil M.Haller, and John S.Walden, Bellcore, S/Key software kit, available via anonymous FTP from thumper.bellcore.com: /pub/nmh/skey/*.
11 Stephen T. Kent, "Internet Privacy Enhanced Mail(PEM)", Communications of the ACM, Aug ust, 1993.
12 ANSI X9.62, The Elliptic Curve Digital Signature Algorithm(ECDSA), Draft Standard, 1997.
13 Winfield Treese and Alec Wolman, "X Through the Firewall, and Other Application Relays, "Cambridge Research Lab. Technical Report 93/10, Digital Equipment Corporation, May 3, 1993.
14 Akyildiz I. F, J. Mcnair, J. Ho, H. Uzunalioglu, W. Wang, "Mobility Management in Current and Future Communications Networks," IEEE Network, July/August 1998.
15 Elnahas A, N. Adly, "Location Management Techniques for Mobile Systems," Information Sciences, 130, 1-22, 2000.   DOI