Optimization of protocol operations in a Public Key Infrastructure

[1]  William Yurcik,et al.  A survey of PKI components and scalability issues , 2006, 2006 IEEE International Performance Computing and Communications Conference.

[2]  Anders Fongen Scalability analysis of selected certificate validation scenarios , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[3]  E. Winjum,et al.  Model and specification for analyzing the scalability of a public key infrastructure , 2009 .

[4]  Russ Housley,et al.  Delegated Path Validation and Delegated Path Discovery Protocol Requirements , 2001, RFC.

[5]  Adam J. Slagell,et al.  PKI Scalability Issues , 2004, ArXiv.

[6]  Ketil Lund,et al.  Web Services i nettverk med begrenset datarate , 2006 .

[7]  Anders Fongen XML Based Certificate Management , 2008 .

[8]  Albert-László Barabási,et al.  Linked - how everything is connected to everything else and what it means for business, science, and everyday life , 2003 .

[9]  David A. Cooper A more efficient use of delta-CRLs , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[10]  Ronald L. Rivest,et al.  Can We Eliminate Certificate Revocations Lists? , 1998, Financial Cryptography.

[11]  David A. Cooper,et al.  A model of certificate revocation , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).