Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker
نویسندگان
چکیده
منابع مشابه
Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker
A Public Key Infrastructure (PKI) is considered one of the most important techniques used to propagate trust in authentication over the Internet. This technology is based on a trust model defined by the original X.509 (1988) standard and is composed of three entities: the certification authority (CA), the certificate holder (or subject), and the Relying Party (RP). The CA plays the role of a tr...
متن کاملKeyNote: Trust Management for Public-Key Infrastructures
This paper discusses the rationale for designing a simple trust-management system for public-key infrastructures, called KeyNote. The motivating principles are expressiveness, simplicity, and extensibility. We believe that none of the existing public-key infrastructure proposals provide as good a combination of these three factors.
متن کاملModelling Trust Structures for Public Key Infrastructures
The development of Public Key Infrastructures (PKIs) is highly desirable to support secure digital transactions and communications throughout existing networks. It is important to adopt a particular trust structure or PKI model at an early stage as this forms a basis for the PKI’s development. Many PKI models have been proposed but use only natural language descriptions. We apply a simple forma...
متن کاملTrust Models and Management in Public-Key Infrastructures
This paper presents and compares several trust models currently being considered and applied for use with public-key certificate infrastructures based on the X.509 specification, including subordinated hierarchies, cross-certified meshes, hybrids, bridge CAs, and trust lists. Approaches and issues concerning constraints on path validity are also considered, as are aspects of path construction.
متن کاملPublic Key Infrastructures for Trust and Authentication in the IoT
The Internet of Things is a global infrastructure of smart electronic devices embedded with sensors with the purpose of collecting, processing, exchanging and delivering data. One of the main requirements of the IoT is that all the connected objects are available at any time. Since the complexity of this network constantly grows, security and privacy are vital for its development. The focus of ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2017
ISSN: 1939-0114,1939-0122
DOI: 10.1155/2017/6907146