1999
DOI: 10.1109/65.806987
|View full text |Cite
|
Sign up to set email alerts
|

An overview of PKI trust models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
88
0
1

Year Published

2000
2000
2016
2016

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 213 publications
(89 citation statements)
references
References 8 publications
0
88
0
1
Order By: Relevance
“…In a dynamic environment, a distributed architecture would probably be a more favorable solution. An overview of work in this direction can be found in [Per99].…”
Section: Discussionmentioning
confidence: 99%
“…In a dynamic environment, a distributed architecture would probably be a more favorable solution. An overview of work in this direction can be found in [Per99].…”
Section: Discussionmentioning
confidence: 99%
“…This issue is commonly referred to as federated identity management. There are many possible technical solutions to this issue based on different security policies, such as those offered by Security Assertion Markup Language (SAML) [50], Web Services Trust (WS-Trust) [51], and PKI [52]. Not only will vendors need to offer consistent technical solutions, but organizations will further need consistent security policies.…”
Section: B Security Policy and Operationsmentioning
confidence: 99%
“…Once more parallels can be drawn with PKI systems where trust networks have to be engineered in order for any other user to see value in the key certificates generated. This is typically achieved either with a hierarchy of globally "trusted nodes called Certificate Authorities" (CA) or by anarchy based methods such as Pretty Good Privacy (PGP) where chains of trust are formed between users who already know each other [19].…”
Section: Verifymentioning
confidence: 99%