Home| Contact Us| New Journals| Browse Journals| Journal Prices| For Authors|

Print ISSN: 2230 – 8776
Online ISSN:


  About JISM
  DLINE Portal Home
Home
Aims & Scope
Editorial Board
Current Issue
Next Issue
Previous Issue
Sample Issue
Upcoming Conferences
Self-archiving policy
Alert Services
Be a Reviewer
Publisher
Paper Submission
Subscription
Contact us
 
  How To Order
  Order Online
Price Information
Request for Complimentary
Print Copy
 
  For Authors
  Guidelines for Contributors
Online Submission
Call for Papers
Author Rights
 
 
RELATED JOURNALS
Journal of Digital Information Management (JDIM)
Journal of Multimedia Processing and Technologies (JMPT)
International Journal of Web Application (IJWA)

 

 
Journal of Information & Systems Management (JISM)

Open source based PKI systems in FP7 projects
Nikolai Stoianov and Emil Altimirski
C4I Development Directorate at Defence Institute 34 Totleben Blvd, Sofia 1000 Bulgaria., Faculty of Telecommunications at Technical University of Sofia 8 Kl. Ohridski Blvd, Sofia 1000 Bulgaria.
Abstract: We investigated the PKI system that are currently used in the FP7 projects which are open sources. We have presented the certification process, key length and structure description in the paper. We describe the PKI architecture that uses two levels of CA. The experimentation is carried out with testbed that have PKI architecture and address the cryptography requirements. To develop the PK system, we have selected the EJBCA models.
Keywords: Security, Certificates, Public-key Infrastructure, PKI, Cryptography
DOI:https://doi.org/10.6025/jism/2022/12/3/78-86
Full_Text   PDF 4.1 MB   Download:   114  times
References:

[1] Carlisle, A. & Lloyd, S.. -Understanding PKI: Concepts (2002), ISBN: 0-672-32391- 5. Standards, and Deployment Considerations?, 2nd edn. Addison-Wesley: Reading, USA.
[2] INDECT Project Web Site (2013). www.indectproject. eu. Accessed 30 April 2013.
[3] OpenCA Project Web Site (2012). www.openca.org/. Accessed 23 April 2013.
[4] EJBCA Enterprise PKI Web Site (2012). www.ejbca.org/. Accessed 25 April 2013.
[5] Stoianov, N., Urueña, M., Niemiec, M., Machník, P. & Maestro, G. (2012). Security Infrastructures: Towards the INDECT System Security, MCSS 2012, CCIS 287. Springer-Verlag: Berlin, Heidelberg, pp. 304–315, ISBN 978-3-642- 30720-1.
[6] Urueña, M., Machník, P., Niemiec, M. & Stoianov, N. (in press) INDECT security architecture, MCSS 2013, 6–7 June 2013. AGH University: Krakow, Poland.


Home | Aim & Scope | Editorial Board | Author Guidelines | Publisher | Subscription | Previous Issue | Contact Us |Upcoming Conferences|Sample Issues|Library Recommendation Form|

 

Copyright © 2011 dline.info