Modeling and Simulation of Public Key Infrastructure Applications
ثبت نشده
چکیده
Public Key Infrastructure (PKI) is one of the primary weapons in the Department of Defense’s (DoD) “defense in depth” information assurance strategy, and will be used to sign all DoD e-mail messages by October 2003. PKI uses asymmetric “public” and “private” keys to sign and/or encrypt e-mail messages and other information. The effect of this additional workload on the existing network and servers was investigated using OPNET Capture Agent, Application Characterization Environment (ACE), and Modeler. Another application which uses PKI, the Secure Single Sign-on prototype, was also investigated using the OPNET Capture Agent, ACE, and Modeler. These types of investigations allow the manager to ascertain the true benefits and performance costs in implementing PK
منابع مشابه
An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملChord-PKI: A distributed trust infrastructure based on P2P networks
Many P2P applications require security services such as privacy, anonymity, authentication, and non-repudiation. Such services could be provided through a hierarchical Public Key Infrastructure. However, P2P networks are usually Internet-scale distributed systems comprised of nodes with undetermined trust level, thus making hierarchical solutions unrealistic. In this paper, we propose Chord-PKI...
متن کاملTürkiye için bir A Public Key Infrastructure Model for Turkey
Starting with the widespread usage of public key based applications, like secure electronic commerce and secure electronic mail, the necessity of an order for the public key storage has been evolved. This order is called as the Public Key Infrastructure. In this paper, we proposed a draft model for a public key infrastructure for Türkiye which comforts Türkiye conditions and the international s...
متن کاملTrain Scheduling Problem - Phase I: A General Simulation Modeling Framework
One of the important problems in management of railway systems is train scheduling problem. This is the problem of determining a timetable for a set of trains that do not violate infrastructure capacities and satisfies some operational constraints. In this study, a feasible timetable generator framework for stochastic simulation modeling is developed. The objective is to obtain a feasible tr...
متن کاملTime-Stamping for Malaysia
One of the most promising uses of time-stamping technology lies in combining it with a public key infrastructure. A public-key infrastructure (PKI) consists of protocols, services, and standards supporting applications of public-key cryptography [1]. Public-key cryptography involves the use of a public and private key pair. Data encrypted with a public key can only be decrypted with its related...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003