In a traditional PKI, the trust associated with a public key is expressed in binary either by 0 or 1. Alternatively, several authors have proposed trust metrics to evaluate the confidence afforded by a public key. However their work has a static point of view and does not take into account the issue of public key revocation. In this paper, we make the first attempt to incorporate the revocation status information into the trust metrics for public key certification. To achieve our goal, we use a tailored form of a vector of trust model recently proposed. This would allow us to reason formally about when there is a need to check revocation status and how reliable the revocation mechanism should be in a given security application. Copyright 20...
Digital certificates signed by trusted certification authorities (CAs) are used for multiple purpos...
Public-key cryptography is widely used to provide Internet security services. The public-key infrast...
One of the hardest tasks of a public key infrastructure (PKI) is to manage revocation. New communica...
Public key infrastructures (PKIs) are complex distributed systems that are responsible for giving us...
Correct certificate revocation practices are essential to each public-key infrastructure. While ther...
In this thesis, I define all currently operational, proposed, and theoretically possible methods of ...
Public key infrastructure provides a promising foundation for verifying the authenticity of communic...
Public key infrastructure has been proposed as a promising foundation for verifying the authenticity...
Due to the character of the original source materials and the nature of batch digitization, quality ...
This paper investigates the role of trust metrics in attack-resistant public key certification. We p...
Public key infrastructure has been proposed as a promising foundation for verifying the authenticity...
One of the hardest tasks of a certification infrastructure is to manage revocation. This process con...
In large open networks, handling trust and authenticity adequately is an important prerequisite for...
According to numerous sources, computer security can be explained as; how to address the three major...
The distribution and revocation of public-key certificates are essential aspects of secure digital c...
Digital certificates signed by trusted certification authorities (CAs) are used for multiple purpos...
Public-key cryptography is widely used to provide Internet security services. The public-key infrast...
One of the hardest tasks of a public key infrastructure (PKI) is to manage revocation. New communica...
Public key infrastructures (PKIs) are complex distributed systems that are responsible for giving us...
Correct certificate revocation practices are essential to each public-key infrastructure. While ther...
In this thesis, I define all currently operational, proposed, and theoretically possible methods of ...
Public key infrastructure provides a promising foundation for verifying the authenticity of communic...
Public key infrastructure has been proposed as a promising foundation for verifying the authenticity...
Due to the character of the original source materials and the nature of batch digitization, quality ...
This paper investigates the role of trust metrics in attack-resistant public key certification. We p...
Public key infrastructure has been proposed as a promising foundation for verifying the authenticity...
One of the hardest tasks of a certification infrastructure is to manage revocation. This process con...
In large open networks, handling trust and authenticity adequately is an important prerequisite for...
According to numerous sources, computer security can be explained as; how to address the three major...
The distribution and revocation of public-key certificates are essential aspects of secure digital c...
Digital certificates signed by trusted certification authorities (CAs) are used for multiple purpos...
Public-key cryptography is widely used to provide Internet security services. The public-key infrast...
One of the hardest tasks of a public key infrastructure (PKI) is to manage revocation. New communica...