Font Size: a A A

For Dedicated Pki Systems In The Field Of Research And Development

Posted on:2006-07-31Degree:MasterType:Thesis
Country:ChinaCandidate:J S XuFull Text:PDF
GTID:2208360155465108Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
With prevalent application of Internet, Human society has apeared enormous changes. Information interaction has become the presently social mainstream. At the same time, while informational security become more and more important, some technologies, such as identifying authentication, access privilege, security of data in communications, have been pushed on the top of current security research.In modern cryptology, Public-Key Infrastructures (PKI) and its X.509 can perfectly achieve purpose of identifying authentication in OSI. As a result of American protection for this technological exports, we hardly acquire the highest encryption. However, in virtue of the open ASN.1 and DER, we have realized the issue of the X.509 Certificate by Java 1.4 software, and the control of access data-base privilege.Secure Socket Layer (SSL) or Transport Layer Security (TLS) with PKI can easily acquire the reliable security during the communication between clients and servers. SSL supporting X.509 certificate provides a secure enhancement to the standard TCP/IP sockets protocol used in Internet communications.This paper studied current PKI and SSL/TLS proposals and relevant issues, and designed the reuse components of the Professional Public Key Infrastructures (PPKI), and realized the datum security in communication based on the identiy authentication and Role Based Access Control (RBAC).
Keywords/Search Tags:Information security, PKI, X.509 Certificate, SSL/TLS, Role Based Access Control
PDF Full Text Request
Related items