Skip to main content

A solution to open standard of PKI

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1438))

Included in the following conference series:

Abstract

PKI (Public Key Infrastructure) is fundamental for many security applications on the network. However, there are so many different kinds of PKI at current stage and they are not compatible. To solve the problem, we propose to implement the authority of authentication verification service systems as personal autonomous software agents, called security agents. In this paper, we introduce its concept and architecture, as well as its communication language, which is needed for public key management and secure communications among security agents and application agents.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. W. Timothy Polk, Donna F. Dodson, etc, Public Key Infrastructure: From Theory to Implementation, http://csrc.ncsl.nist.gov/pki/panel/overview.html, NIST.

    Google Scholar 

  2. URL, Public-Key Infrastructure (X.509) (pkix), http://www.ietf.org/html.charters/pkix-charter.html

    Google Scholar 

  3. URL, RSA Laboratories, PKCS (Public Key Crypto System) http://www.rsa.com/rsalabs/pubs/PKCS/

    Google Scholar 

  4. Philip R. Zimmermann, The Official PGP User's Guide MIT Press 1995.

    Google Scholar 

  5. Carl M. Ellison, Bill Frantz, Butler Lampson, Ron Rivest, Brian M. Thomas, Tatu Ylonen, Simple Public Key Certificate, http://www.clark.net/pub/cme/spki.txt

    Google Scholar 

  6. Ronald L. Rivest, Butler Lampson, SDSI — A Simple Distributed Security Infrastructure, http://theory.lcs.mit.edu/ cis/sdsi.html

    Google Scholar 

  7. Matt Blaze, Joan Feigenbaum, Jack Lacy, Decentralized Trust Management, In Proceedings 1996 IEEE Symposium on Security and Privacy, May, 1996.

    Google Scholar 

  8. Tim Finin, James Mayfield, Chelliah Thirunavukkarasu, Secret Agents — A Security Architecture for the KQML Agent Communication Language, CIKM'95 Intelligent Information Agents Workshop, Baltimore, December 1995.

    Google Scholar 

  9. Leonard N. Foner, A Security Architecture for Multi-Agent Matchmaking, Proceeding of Second International Conference on Multi-Agent System, Mario Tokoro, 1996.

    Google Scholar 

  10. Tim Finin, Yannis Labrou, and James Mayfield, KQML as an agent communication language, in Jeff Bradshaw (Ed.), “Software Agents”, MIT Press, Cambridge (1997).

    Google Scholar 

  11. Sycara, K., Decker, K, Pannu, A., Williamson, M and Zeng, D., Distributed Intelligent Agents, IEEE Expert, pp.36–45, December 1996.

    Google Scholar 

  12. Qi He, Katia P. Sycara, and Timothy W. Finin, Personal Security Agent: KQML-Based PKI, to appear in Autonomous Agents'98, Minneapolis/St. Paul, May 10–13, 1998.

    Google Scholar 

  13. R. Anderson and R. Needham Robustness Principles for Public Key Protocols,Lecture Notes on Computer Science, 963:236–247, 1995.

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Colin Boyd Ed Dawson

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

He, Q., Sycara, K., Su, Z. (1998). A solution to open standard of PKI. In: Boyd, C., Dawson, E. (eds) Information Security and Privacy. ACISP 1998. Lecture Notes in Computer Science, vol 1438. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0053725

Download citation

  • DOI: https://doi.org/10.1007/BFb0053725

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64732-4

  • Online ISBN: 978-3-540-69101-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics