A ubiquitous ICT environment has rapidly developed through cloud computing, and it has become very convenient to use. However, the threats of computer viruses, unauthorized access, attacks on servers, etc. have emerged. These threats also occur in the scientific environment. Thus, a public key infrastructure (PKI) construction for achieving safe and secure use of a university ICT environment is desired. The University PKI project is underway at the National Institute of Informatics, and common specifications, such as supply specifications for a campus PKI and certificate policy/certification practice statement guidelines, have been proposed. However, PKI is still rarely deployed. It is generally a high cost structure, and this has become one of the issues in the spread and promotion of PKI. This study quantitatively clarifies the cost structure of PKI through a work simulation. This clarification will contribute to the spread and promotion of a campus PKI.
[1]
W. Duncan.
A GUIDE TO THE PROJECT MANAGEMENT BODY OF KNOWLEDGE
,
1996
.
[2]
Okabe Yasuo,et al.
Designing federation architecture of the UPKI interuniversity authentication and authorization platform
,
2006
.
[3]
Hiroyuki Sato,et al.
N+/-epsilon: Reflecting Local Risk Assessment in LoA
,
2009,
OTM Conferences.
[4]
Warwick Ford,et al.
Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework
,
2003,
RFC.
[5]
Katsuyoshi Iida,et al.
Construction and Operation of Campus-Wide Authentication and Authorization System
,
2009
.