Abstract | ||
---|---|---|
This paper is devoted to design SecurityAPI that solves the disadvantages and restrictions due to several attack types of public key SecurityAPI and provides the security services. SecurityAPI may be applied to both domestic and foreign standard using domestic standard algorithm such as KCDSA and HAS-160 added to conventional PKCS #11. To verify the security of SecurityAPI for protecting key object based on public key, we provide the flow chart of each SecurityAPI function by graphical method using CPN and describe the process of SecurityAPI by sentence. Also, we analyze the CPN model of proposed Security API structure using the place invariant and verify the security of SecurityAPI that we do not need the modification for input data. |
Year | DOI | Venue |
---|---|---|
2006 | 10.1109/CIT.2006.74 | CIT |
Keywords | Field | DocType |
foreign standard,security api structure,flow chart,attack type,security service,conventional pkcs,cpn model,securityapi function,public key securityapi,key object,public key,information security,algorithm design and analysis,petri nets,computer security,public key cryptography,computer science,data security | Security testing,Data security,Security through obscurity,Computer science,Covert channel,Security association,PKCS #11,Security information and event management,Computer security model,Distributed computing | Conference |
ISBN | Citations | PageRank |
0-7695-2687-X | 0 | 0.34 |
References | Authors | |
4 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Kun-Won Jang | 1 | 7 | 1.90 |
Junho Choun | 2 | 0 | 0.34 |
Myung-Hee Kim | 3 | 26 | 10.85 |
Moon-seog Jun | 4 | 0 | 0.34 |