2005
DOI: 10.1007/11533733_8
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Public Key Infrastructures in the Real World

Abstract: Abstract. PKIs are complex distributed systems that are responsible for giving users enough information to make reasonable trust judgments about one another. Since the currencies of PKI are trust and certificates, users who make trust decisions (often called relying parties) must do so using only some initial trust beliefs about the PKI and some pile of certificates (and other assertions) they received from the PKI. Given a certificate, a relying party needs to conclude that the keyholder described by the cert… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2006
2006
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 23 publications
0
6
0
Order By: Relevance
“…In this paper, we choose to use graph theory to model and reason about the security of such systems, as this representation is intuitive and can support arguments concerning the network connections of the nodes. Our representation is compatible with the seminal work of Maurer [Mau96] and its extension [MS05]. We begin by defining the basic concepts of our model, then we consider the capabilities of possible adversaries, and finally we give examples by instantiating our model with OpenPGP and X.509 to show its generality.…”
Section: A Model Of a Tm System For Authenticationmentioning
confidence: 99%
“…In this paper, we choose to use graph theory to model and reason about the security of such systems, as this representation is intuitive and can support arguments concerning the network connections of the nodes. Our representation is compatible with the seminal work of Maurer [Mau96] and its extension [MS05]. We begin by defining the basic concepts of our model, then we consider the capabilities of possible adversaries, and finally we give examples by instantiating our model with OpenPGP and X.509 to show its generality.…”
Section: A Model Of a Tm System For Authenticationmentioning
confidence: 99%
“…Maurer's model was revised by Marchesini and Smith [22] in order to deal with the complexity of the real world issues. Maurer's model did not consider the revocation and the expiration issue.…”
Section: Trust and Certication Authoritymentioning
confidence: 99%
“…not contain a time parameter, which is necessary for key revocation. Marchesini [19] addressed this issue and extended Maurer's model by axioms for properties, time and domain and thus provided numerous additional abilities of the system, including key revocation. In 2006 Bicakci [20] also investigated the incorporation of certificate revocation in this system and Gligor [21] discussed the need of additional parameters such as multiple types of evidence, negative evidence, and false evidence when using Maurer's model in ad-hoc networks.…”
Section: Trust Metricsmentioning
confidence: 99%