- citati u SCIndeksu: 0
- citati u CrossRef-u:[1]
- citati u Google Scholaru:[
]
- posete u poslednjih 30 dana:6
- preuzimanja u poslednjih 30 dana:6
|
|
2017, vol. 65, br. 3, str. 771-784
|
Tačke otkaza u PKI arhitekturi
Failure points in the PKI architecture
aSerbian Armed Forces, General Staff, Department of Telecommunications and IT (J-6), Centre for Applied Mathematics and Electronics, Belgrade bMinistry of Defence of the Republic of Serbia, Military Intelligence Agency, Belgrade
e-adresa: radomir.prodanovic@vs.rs, ivan.vulic@vs.rs
Sažetak
Tokom poslednjih 20 godina PKI arhitektura našla je široku primenu, posebno u oblastima koje su zahtevale uspostavljanje sigurnosne infrastrukture. S obzirom na to da se koristi radi sigurnosti jasno je da je njen nesmetan rad jedan od osnovnix zahteva koji se postavlja pri njenoj implementaciji, a već samim uvidom u brojne tipove arhitektura i različite implementacije uviđa se njena kompleksnost. Zbog toga je razmatranje potencijalnih tačaka otkaza od velike važnosti. Kako se radi o vrlo složenim infrastrukturama, ovaj rad daće samo osnovni pregled tačaka koje mogu biti tačke otkaza, bez detalja koji su karakteristični za pojedine primene i tipove implementacija.Tražiće se zajedničke karakteristike PKI arhitektura i na njima objašnjavati značaj otkaza koji se mogu desiti, a tamo gde je moguće biće navedeni i predlozi za njihovo prevazilaženje.
Abstract
Over the last 20 years, the PKI architecture has found its vast application, especially in the fields which require the establishment of a security infrastructure. Given that the purpose of this architecture is to be used for achieving higher security standards, its smooth operation has to be one of the main requirements for its implementation. Its complexity is mirrored in the numerous implementations that the PKI has had so far. For all the reasons mentioned above, it is of great importance to consider potential failure points of such a structure. Due to the complexity of these structures, this paper will present only a basic review of such stress points, without providing details on specific applications and types of implementations. The significance of failure points will be explained by examining the common features of the PKI architectures and the occurrence of failure points in these structures, and where possible, an overview of suggestions for preventing such failures will be provided.
|
|
|
Reference
|
1
|
Adams, C., Lloyd, S. (2003) Understanding PKI: Concepts, standards, and deployment considerations. Addison-Wesley, pp. 11-15
|
|
Chokani, S., Ford, W., Sabett, R., Merrill, C., Wu, S. (2003) Internet X.509 public key infrastructur certificate policy and certification practices framework. RFC 3647
|
|
Moses, T. (2003) PKI trust models. Draft. Available at: http://automedicbilling.com/CalculateSavings/PKI_Trust_models.pdf. Accessed: 17 May2016
|
|
Ramović, R. (2005) Pouzdanost sistema elektronskih, telekomunikacionih i informacionih. Beograd: Katedra za mikroelektroniku i tehničku fiziku, in Serbian
|
2
|
Schneier, B. (1996) Applied cryptography. John Wiley & Sons
|
|
Souza, T.C.S., Martina, J.E., Custodio, R.F. (2007) Audit and backup procedures for hardware security modules. White paper
|
|
|
|