Loading...
Loading...

Go to the content (press return)

On the self-similarity nature of the revocation data

Author
Hernandez, C.; Mata, J.; Muñoz, J.; Esparza, O.; Alins, J.
Type of activity
Presentation of work at congresses
Name of edition
15th International Conference on Information Security
Date of publication
2012
Presentation's date
2012-09
Book of congress proceedings
Information Security and Cryptology: ICISC 2012: 15th International Conference, Seoul, Korea, November 28-30, 2012: revised selected papers
First page
387
Last page
400
Publisher
Springer
DOI
https://doi.org/10.1007/978-3-642-33383-5_24 Open in new window
Repository
http://hdl.handle.net/2117/19600 Open in new window
URL
http://download.springer.com/static/pdf/282/chp%253A10.1007%252F978-3-642-33383-5_24.pdf?auth66=1351867066_e256b183a7b2c1f99b71a3a674631542&ext=.pdf Open in new window
Abstract
One of the hardest tasks of a Public Key Infrastructure (PKI) is to manage revocation. Different revocation mechanisms have been proposed to invalidate the credentials of compromised or misbe- having users. All these mechanisms aim to optimize the transmission of revocation data to avoid unnecessary network overhead. To that end, they establish release policies bas ed on the assumption that the revoca- tion data follows uniform or Poisson distribution. Temporal distribution of the revocation dat...
Citation
Gañán, C. [et al.]. On the self-similarity nature of the revocation data. A: International Conference on Information Security. "Information Security and Cryptology: ICISC 2012: 15th International Conference, Seoul, Korea, November 28-30, 2012: revised selected papers". Seoul: Springer, 2012, p. 387-400.
Keywords
Certification, Public Key Infrastructure, Revocation, Self-similarity
Group of research
DISEN - Distributed Sensor Networks
ISG - Information Security Group

Participants