Suite B Certificate and Certificate Revocation List (CRL) Profile
نویسندگان
چکیده
This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
منابع مشابه
Intrusion prevention and Message Authentication Protocol (IMAP) using Region Based Certificate Revocation List Method in Vehicular Ad hoc Networks
Vehicular Ad-hoc network uses some advanced Public Key Infrastructure and digital signature method for security. But, intrusion detection and avoidance is an inevitable challenge in networks. Authentication is performed in any PKI (Public Key Infrastructure) system by checking if the certificate of the sender is included in the CRL (Certificate Revocation List) and verifying the authenticity an...
متن کاملUpdate to DirectoryString Processing in the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This document updates the handling of DirectoryStrin...
متن کاملHasten Message Authentication Protocol for Vehicular Ad Hoc Networks
In Vehicular ad hoc network (VANET) vehicles communicates through wireless channels, so there will be variety of attacks. To secure vehicular ad hoc network, deployed Public Key Infrastructure (PKI), and to use Certificate Revocation List (CRL) for managing the revoked certificates. The authentication of received message can be performed by first check if the sender’s certificate is in current ...
متن کاملRFC 6487 Resource
This document defines a standard profile for X.509 certificates for the purpose of supporting validation of assertions of "right-of-use" of Internet Number Resources (INRs). The certificates issued under this profile are used to convey the issuer’s authorization of the subject to be regarded as the current holder of a "right-of-use" of the INRs that are described in the certificate. This docume...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- RFC
دوره 5759 شماره
صفحات -
تاریخ انتشار 2010