Research and application of EJBCA based on J2EE

  • Liyi Zhang
  • Qihua Liu
  • Min Xu
Conference paper
Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT, volume 251)


This article carries on the exhaustive analysis and the research of the opened source system EJBCA based on the J2EE, furthermore conducts the distribution and deployment in accordance with the required software on the Linux platform, on this basis, and builds a specific application example of EJBCA. In the end, the authors have carried on the prospect about expansion and practical application capacity of EJBCA system, hope to have the important significance of model to the independent own research and development of present domestic PKI technology and product.


Encryption Algorithm Certificate Authority Digital Certificate Server Certificate Operating System Platform 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Z.S. Guan, Public key infrasture and certificate authority, Publishing House of Electronics Industry, Beijing (2002).Google Scholar
  2. 2.
    Ejbca-design. Scholar
  3. 3.
    R. Johnson and H.P. Wei, The guile of J2EE design and development, Publishing House of Electronics Industry, America (2003).Google Scholar
  4. 4.
    EJBCA: readm.txt. Scholar
  5. 5.
    Q. Chen and Q.S. Ling, The example of security CA—research of EJBCA, Computer Engineering and Design (2005).Google Scholar
  6. 6.
    X. Chen, The design and development of EJBCA, Wuhan: Wuhan University, 2006.Google Scholar
  7. 7.
    H. Zhang, Research on the Security Authentication of Electronic Commerce and the Design and Implementation of the CA Model, Computer technology (2006).Google Scholar
  8. 8.
    B.S. Zhou and L. Zhang, Research of EJBCA on WPKI environment, Computer Engineering and Design (2005).Google Scholar
  9. 9.
    T.W. Xiao, S.Y. Zhang and Y.P. Zhong, Design and Implementation of PKI/CA-based Middleware System, Computer Engineering (2006).Google Scholar
  10. 10.
    J.C. Li and H.L. Liu, Research on Secure Payment Protocols of Electronic Commerce, Value Engineering (2006).Google Scholar
  11. 11.
    L.N. Lan and X.Y. Liu, Research on Security Architecture in E-Commerce System, China Information Security (2007).Google Scholar
  12. 12.
    Q.H. Shuai, The Analysis of safe Certificate in E-Commerce, Net Security Technologies and Application (2007).Google Scholar
  13. 13.
    PKI Tutorial. Scholar
  14. 14.
    EJBCA-Architecture. Scholar
  15. 15.
    Enterprise Text Message Platform. s. asp.[2007-03-20].Google Scholar

Copyright information

© International Federation for Information Processing 2007

Authors and Affiliations

  • Liyi Zhang
    • 1
  • Qihua Liu
    • 1
  • Min Xu
    • 1
  1. 1.Center for Studies of Information ResourcesWuhan UniversityWuhanP.R.China

Personalised recommendations