A Study of Using the Bridge Certrficate Authentication(BCA)Apply to the Private Key Infrastructure(PKI)in the Military

碩士 === 國防管理學院 === 國防資訊研究所 === 93 === Summary The Bridge Certification Authority (BCA) have obvious characteristics of interflowing , flexibility and convenient. A lot of developed countries, such as U.S.A., Japan , South Korea .,etc., had introdued BCA to the Cross-Certificate model of national lev...

Full description

Bibliographic Details
Main Authors: Ja-Hong Liu, 劉家宏
Other Authors: 陳正鎔
Format: Others
Language:zh-TW
Published: 2005
Online Access:http://ndltd.ncl.edu.tw/handle/37794205464969620175
id ndltd-TW-093NDMC1654033
record_format oai_dc
spelling ndltd-TW-093NDMC16540332015-10-13T12:56:39Z http://ndltd.ncl.edu.tw/handle/37794205464969620175 A Study of Using the Bridge Certrficate Authentication(BCA)Apply to the Private Key Infrastructure(PKI)in the Military 橋接憑證認證中心(BCA)應用於國軍公開金鑰基礎建設(PKI)之研究 Ja-Hong Liu 劉家宏 碩士 國防管理學院 國防資訊研究所 93 Summary The Bridge Certification Authority (BCA) have obvious characteristics of interflowing , flexibility and convenient. A lot of developed countries, such as U.S.A., Japan , South Korea .,etc., had introdued BCA to the Cross-Certificate model of national level since 2000. Our government also established the BCA in 2004, set up a platform to cross certificate for government departments , folk units and foreign organizations. From that, we can understand appling BCA to PKI structure is a trend of world now. Look at the Public Key Infrastructures (PKI) of the military. For having an invincible position between Cross-Strait military competition, every military affairs should have perspective ideas and forward planning . The focal point of this study was how to introduce the latest information technology into the military, built a set of BCA- constructing-model on the basis of existing PKI, and set up a safe , reliable, flexible and valid Cross-Certificate system in the military. 陳正鎔 傅振華 2005 學位論文 ; thesis 90 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國防管理學院 === 國防資訊研究所 === 93 === Summary The Bridge Certification Authority (BCA) have obvious characteristics of interflowing , flexibility and convenient. A lot of developed countries, such as U.S.A., Japan , South Korea .,etc., had introdued BCA to the Cross-Certificate model of national level since 2000. Our government also established the BCA in 2004, set up a platform to cross certificate for government departments , folk units and foreign organizations. From that, we can understand appling BCA to PKI structure is a trend of world now. Look at the Public Key Infrastructures (PKI) of the military. For having an invincible position between Cross-Strait military competition, every military affairs should have perspective ideas and forward planning . The focal point of this study was how to introduce the latest information technology into the military, built a set of BCA- constructing-model on the basis of existing PKI, and set up a safe , reliable, flexible and valid Cross-Certificate system in the military.
author2 陳正鎔
author_facet 陳正鎔
Ja-Hong Liu
劉家宏
author Ja-Hong Liu
劉家宏
spellingShingle Ja-Hong Liu
劉家宏
A Study of Using the Bridge Certrficate Authentication(BCA)Apply to the Private Key Infrastructure(PKI)in the Military
author_sort Ja-Hong Liu
title A Study of Using the Bridge Certrficate Authentication(BCA)Apply to the Private Key Infrastructure(PKI)in the Military
title_short A Study of Using the Bridge Certrficate Authentication(BCA)Apply to the Private Key Infrastructure(PKI)in the Military
title_full A Study of Using the Bridge Certrficate Authentication(BCA)Apply to the Private Key Infrastructure(PKI)in the Military
title_fullStr A Study of Using the Bridge Certrficate Authentication(BCA)Apply to the Private Key Infrastructure(PKI)in the Military
title_full_unstemmed A Study of Using the Bridge Certrficate Authentication(BCA)Apply to the Private Key Infrastructure(PKI)in the Military
title_sort study of using the bridge certrficate authentication(bca)apply to the private key infrastructure(pki)in the military
publishDate 2005
url http://ndltd.ncl.edu.tw/handle/37794205464969620175
work_keys_str_mv AT jahongliu astudyofusingthebridgecertrficateauthenticationbcaapplytotheprivatekeyinfrastructurepkiinthemilitary
AT liújiāhóng astudyofusingthebridgecertrficateauthenticationbcaapplytotheprivatekeyinfrastructurepkiinthemilitary
AT jahongliu qiáojiēpíngzhèngrènzhèngzhōngxīnbcayīngyòngyúguójūngōngkāijīnyàojīchǔjiànshèpkizhīyánjiū
AT liújiāhóng qiáojiēpíngzhèngrènzhèngzhōngxīnbcayīngyòngyúguójūngōngkāijīnyàojīchǔjiànshèpkizhīyánjiū
AT jahongliu studyofusingthebridgecertrficateauthenticationbcaapplytotheprivatekeyinfrastructurepkiinthemilitary
AT liújiāhóng studyofusingthebridgecertrficateauthenticationbcaapplytotheprivatekeyinfrastructurepkiinthemilitary
_version_ 1716869791823691776