A Study of Using the Bridge Certrficate Authentication(BCA)Apply to the Private Key Infrastructure(PKI)in the Military
碩士 === 國防管理學院 === 國防資訊研究所 === 93 === Summary The Bridge Certification Authority (BCA) have obvious characteristics of interflowing , flexibility and convenient. A lot of developed countries, such as U.S.A., Japan , South Korea .,etc., had introdued BCA to the Cross-Certificate model of national lev...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2005
|
Online Access: | http://ndltd.ncl.edu.tw/handle/37794205464969620175 |
id |
ndltd-TW-093NDMC1654033 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-093NDMC16540332015-10-13T12:56:39Z http://ndltd.ncl.edu.tw/handle/37794205464969620175 A Study of Using the Bridge Certrficate Authentication(BCA)Apply to the Private Key Infrastructure(PKI)in the Military 橋接憑證認證中心(BCA)應用於國軍公開金鑰基礎建設(PKI)之研究 Ja-Hong Liu 劉家宏 碩士 國防管理學院 國防資訊研究所 93 Summary The Bridge Certification Authority (BCA) have obvious characteristics of interflowing , flexibility and convenient. A lot of developed countries, such as U.S.A., Japan , South Korea .,etc., had introdued BCA to the Cross-Certificate model of national level since 2000. Our government also established the BCA in 2004, set up a platform to cross certificate for government departments , folk units and foreign organizations. From that, we can understand appling BCA to PKI structure is a trend of world now. Look at the Public Key Infrastructures (PKI) of the military. For having an invincible position between Cross-Strait military competition, every military affairs should have perspective ideas and forward planning . The focal point of this study was how to introduce the latest information technology into the military, built a set of BCA- constructing-model on the basis of existing PKI, and set up a safe , reliable, flexible and valid Cross-Certificate system in the military. 陳正鎔 傅振華 2005 學位論文 ; thesis 90 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國防管理學院 === 國防資訊研究所 === 93 === Summary
The Bridge Certification Authority (BCA) have obvious characteristics of interflowing , flexibility and convenient. A lot of developed countries, such as U.S.A., Japan , South Korea .,etc., had introdued BCA to the Cross-Certificate model of national level since 2000.
Our government also established the BCA in 2004, set up a platform to cross certificate for government departments , folk units and foreign organizations. From that, we can understand appling BCA to PKI structure is a trend of world now.
Look at the Public Key Infrastructures (PKI) of the military. For having an invincible position between Cross-Strait military competition, every military affairs should have perspective ideas and forward planning .
The focal point of this study was how to introduce the latest information technology into the military, built a set of BCA- constructing-model on the basis of existing PKI, and set up a safe , reliable, flexible and valid Cross-Certificate system in the military.
|
author2 |
陳正鎔 |
author_facet |
陳正鎔 Ja-Hong Liu 劉家宏 |
author |
Ja-Hong Liu 劉家宏 |
spellingShingle |
Ja-Hong Liu 劉家宏 A Study of Using the Bridge Certrficate Authentication(BCA)Apply to the Private Key Infrastructure(PKI)in the Military |
author_sort |
Ja-Hong Liu |
title |
A Study of Using the Bridge Certrficate Authentication(BCA)Apply to the Private Key Infrastructure(PKI)in the Military |
title_short |
A Study of Using the Bridge Certrficate Authentication(BCA)Apply to the Private Key Infrastructure(PKI)in the Military |
title_full |
A Study of Using the Bridge Certrficate Authentication(BCA)Apply to the Private Key Infrastructure(PKI)in the Military |
title_fullStr |
A Study of Using the Bridge Certrficate Authentication(BCA)Apply to the Private Key Infrastructure(PKI)in the Military |
title_full_unstemmed |
A Study of Using the Bridge Certrficate Authentication(BCA)Apply to the Private Key Infrastructure(PKI)in the Military |
title_sort |
study of using the bridge certrficate authentication(bca)apply to the private key infrastructure(pki)in the military |
publishDate |
2005 |
url |
http://ndltd.ncl.edu.tw/handle/37794205464969620175 |
work_keys_str_mv |
AT jahongliu astudyofusingthebridgecertrficateauthenticationbcaapplytotheprivatekeyinfrastructurepkiinthemilitary AT liújiāhóng astudyofusingthebridgecertrficateauthenticationbcaapplytotheprivatekeyinfrastructurepkiinthemilitary AT jahongliu qiáojiēpíngzhèngrènzhèngzhōngxīnbcayīngyòngyúguójūngōngkāijīnyàojīchǔjiànshèpkizhīyánjiū AT liújiāhóng qiáojiēpíngzhèngrènzhèngzhōngxīnbcayīngyòngyúguójūngōngkāijīnyàojīchǔjiànshèpkizhīyánjiū AT jahongliu studyofusingthebridgecertrficateauthenticationbcaapplytotheprivatekeyinfrastructurepkiinthemilitary AT liújiāhóng studyofusingthebridgecertrficateauthenticationbcaapplytotheprivatekeyinfrastructurepkiinthemilitary |
_version_ |
1716869791823691776 |