Jøsang et al., 2000 - Google Patents
PKI seeks a trusting relationshipJøsang et al., 2000
View PDF- Document ID
- 10398385138465264787
- Author
- Jøsang A
- Pedersen I
- Povey D
- Publication year
- Publication venue
- Australasian Conference on Information Security and Privacy
External Links
Snippet
All human interaction is based on trust, meaning that we choose interaction partners and make commitment decisions based on how much we trust the other party. Digital certificates and public-key infrastructures represent an attempt to mimic real-world human assessment …
- 230000003993 interaction 0 abstract description 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3265—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2021206913B2 (en) | Systems and methods for distributed data sharing with asynchronous third-party attestation | |
AU2003259136B2 (en) | A remote access service enabling trust and interoperability when retrieving certificate status from multiple certification authority reporting components | |
US7478236B2 (en) | Method of validating certificate by certificate validation server using certificate policies and certificate policy mapping in public key infrastructure | |
WO2004081756A2 (en) | Trust governance framework | |
CN109981287A (en) | A kind of code signature method and its storage medium | |
Jøsang et al. | PKI seeks a trusting relationship | |
Jøsang et al. | Trust management for e-commerce | |
Hayes | The problem with multiple roots in web browsers-certificate masquerading | |
Berbecaru et al. | On the complexity of public-key certificate validation | |
Boeyen et al. | Liberty trust models guidelines | |
Crispo et al. | WWW security and trusted third party services | |
Ølnes | A taxonomy for trusted services | |
López et al. | Hierarchical organization of certification authorities for secure environments | |
Ølnes et al. | Use of a validation authority to provide risk management for the PKI relying party | |
Alamillo-Domingo | the European Union | |
Boeyen et al. | Trust models guidelines | |
Komninos | PKI systems | |
Sultan et al. | Overcoming Barriers to Client-Side Digital Certificate Adoption | |
Mazaher et al. | A survey of state of the art in public key infrastructure | |
Tjøstheim | A critical view on public key infrastructures | |
Batarfi | Certificate validation in untrusted domains | |
Berbecaru et al. | Digital certificates and public-key infrastructures | |
Platform | Trusted mobile platform | |
Lopez et al. | A Public Key Infrastructure for User Identification | |
Sharon Boeyen et al. | Liberty Trust Models Guidelines |