Certificate management is a crucial element in PKI implementations, which includes certificate generation, distribution, storage, and revocation. Most of the existing research has been focusing on the security aspect or the functionality and the structure of certificate management systems. Very little has looked at the actual user requirements for the system and how users can use the system conveniently and practically, which is actually a very important factor for the whole security system to work properly and to be widely accepted.In this thesis we have designed a framework that provides a flexible certificate management for different security levels according to user requirements and situations, and with a user-friendly interface. A certificate management system CSA (Certificate Server Adapter) is implemented for HP OpenView Operations for Windows (OVO/Windows), which is a management software product provided by Hewlett-Packard. The CSA helps OVO/Windows to provide secure HTTPS client/server communication…
Contents
1 Introduction
1.1 Overall Problems
1.2 Motivations
1.3 Objectives
1.4 Outline
2 Background
2.1 Theoretical Background
2.1.1 Computer Security and Cryptography
2.1.2 HTTPS
2.1.3 Public Key Infrastructure (PKI)
2.1.4 Certificate Management
2.2 Related Works
3 Analysis
3.1 Goals
3.2 The Application System
3.2.1 Introduction
3.2.2 Architecture
3.2.3 Installation Scenarios
3.3 Goals Revisited
3.4 Discussion
3.4.1 Certificate Deployment
3.4.2 Node Mapping
3.4.3 Operating in a Multiple-Server Installation Environment
3.5 Selected Approach
4 Design
4.1 Architecture
4.1.1 Microsoft Technologies
4.2 Basic Assumptions and Definitions
4.2.1 Certificate Request Types
4.2.2 Auto-Granting Certificate Requests
4.2.3 Node Mapping
4.2.4 Certificate States
4.2.5 Multiple-Server Environment
4.3 Flow Chart
4.4 Use Cases
5 Implementation
5.1 Implementation
5.1.1 Developing Environment
5.1.2 Database and Model
5.1.3 COM Interfaces and Classes
5.2 User Interface Design
5.3 Command Line Tools
5.3.1 The Tool ovowcsa
5.3.2 The Tool ovowcsacm
5.4 Testing
5.5 Evaluation
5.5.1 Functionality
5.5.2 Usability
5.5.3 Security
5.5.4 Limitation
6 Conclusion
6.1 Conclusion……….
Source: Linköping University
Download URL 2: Visit Now