Modeling and Simulation of Public Key Infrastructure Applications

ثبت نشده
چکیده

Public Key Infrastructure (PKI) is one of the primary weapons in the Department of Defense’s (DoD) “defense in depth” information assurance strategy, and will be used to sign all DoD e-mail messages by October 2003. PKI uses asymmetric “public” and “private” keys to sign and/or encrypt e-mail messages and other information. The effect of this additional workload on the existing network and servers was investigated using OPNET Capture Agent, Application Characterization Environment (ACE), and Modeler. Another application which uses PKI, the Secure Single Sign-on prototype, was also investigated using the OPNET Capture Agent, ACE, and Modeler. These types of investigations allow the manager to ascertain the true benefits and performance costs in implementing PK

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

Chord-PKI: A distributed trust infrastructure based on P2P networks

Many P2P applications require security services such as privacy, anonymity, authentication, and non-repudiation. Such services could be provided through a hierarchical Public Key Infrastructure. However, P2P networks are usually Internet-scale distributed systems comprised of nodes with undetermined trust level, thus making hierarchical solutions unrealistic. In this paper, we propose Chord-PKI...

متن کامل

Türkiye için bir A Public Key Infrastructure Model for Turkey

Starting with the widespread usage of public key based applications, like secure electronic commerce and secure electronic mail, the necessity of an order for the public key storage has been evolved. This order is called as the Public Key Infrastructure. In this paper, we proposed a draft model for a public key infrastructure for Türkiye which comforts Türkiye conditions and the international s...

متن کامل

Train Scheduling Problem - Phase I: A General Simulation Modeling Framework

One of the important problems in management of railway systems is train scheduling problem. This is the problem of determining a timetable for a set of trains that do not violate infrastructure capacities and satisfies some operational constraints. In this study, a feasible timetable generator framework for stochastic simulation modeling is developed. The objective is to obtain a feasible tr...

متن کامل

Time-Stamping for Malaysia

One of the most promising uses of time-stamping technology lies in combining it with a public key infrastructure. A public-key infrastructure (PKI) consists of protocols, services, and standards supporting applications of public-key cryptography [1]. Public-key cryptography involves the use of a public and private key pair. Data encrypted with a public key can only be decrypted with its related...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003