Modelling Trust Structures for Public Key Infrastructures
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
URSA: ubiquitous and robust access control for mobile ad hoc networks
IEEE/ACM Transactions on Networking (TON)
EURASIP Journal on Wireless Communications and Networking
Building a virtual hierarchy to simplify certification path discovery in mobile ad-hoc networks
Computer Communications
Performance evaluation and comparison of different ad hoc routing protocols
Computer Communications
Bridging disjoint trusted domains into a trustworthy system
AIC'07 Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Informatics and Communications - Volume 7
PLUS: parameterised localised trust management-based security framework for sensor networks
International Journal of Sensor Networks
A comprehensive trust model for component software
Proceedings of the 4th international workshop on Security, privacy and trust in pervasive and ubiquitous computing
A scalable authentication model based on public keys
Journal of Network and Computer Applications
Enhanced Security Scheme for Managing Heterogeneous Server Platforms
Computational Intelligence and Security
A calculus of trust and its application to PKI and identity management
Proceedings of the 8th Symposium on Identity and Trust on the Internet
A secure multiple-agent cryptographic key recovery system
IRI'09 Proceedings of the 10th IEEE international conference on Information Reuse & Integration
Trust Model to Enhance Security and Interoperability of Cloud Environment
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
New adaptive trust models against DDoS: back-up CA and mesh PKI
HSI'03 Proceedings of the 2nd international conference on Human.society@internet
Methodology to bridge different domains of trust in mobile communications
iTrust'03 Proceedings of the 1st international conference on Trust management
A process-oriented model for authentication on the basis of a coloured Petri net
BPM'03 Proceedings of the 2003 international conference on Business process management
Multigrid based key predistribution scheme in ad hoc networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Investigating the openPGP web of trust
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
PROSEARCH: a protocol to simplify path discovery in critical scenarios
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
Hybrid authentication and key management scheme for WSANs
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
An efficient scheme of merging multiple public key infrastructures in ERP
WAIM'05 Proceedings of the 6th international conference on Advances in Web-Age Information Management
A practical scheme of merging multiple public key infrastructures in e-commerce
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Multi-domain public key infrastructure for information security with use of a multi-agent system
ACIIDS'13 Proceedings of the 5th Asian conference on Intelligent Information and Database Systems - Volume Part I
A practical reputation system for pervasive social chatting
Journal of Computer and System Sciences
A Secure Correspondent Router Protocol for NEMO Route Optimization
Computer Networks: The International Journal of Computer and Telecommunications Networking
Leveraging Social Feedback to Verify Online Identity Claims
ACM Transactions on the Web (TWEB)
High-performance capabilities for 1-hop containment of network attacks
IEEE/ACM Transactions on Networking (TON)
Hi-index | 0.00 |
If Alice and Bob each know their own private key and the other's public key, they can communicate securely, through any number of public key based protocols such as IPSec, PGP, S/MIME, or SSL. However, how do they know each other's public keys? The goal of a public key infrastructure (PKI) is to enable secure, convenient, and efficient discovery of public keys. It should be applicable within as well as between organizations, and scalable to support the Internet. There are various types of PKI that are widely deployed or have been proposed. They differ in the configuration information required, trust rules, and flexibility. There are standards such as X.509 and PKIX, but these are sufficiently flexible so that almost any model of PKI can be supported. We describe several types of PKI and discuss the advantages and disadvantages of each. We argue against several popular and widely deployed models as being insecure, unscalable, or overly inconvenient. We also recommend a particular model