1999
DOI: 10.1007/3-540-48390-x_7
|View full text |Cite
|
Sign up to set email alerts
|

Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
8
0

Year Published

2000
2000
2010
2010

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 18 publications
1
8
0
Order By: Relevance
“…A very different approach is taken by PGP [22], where certificates define a `web of trust` and there is no central CA. We share the view advocated by many [22,4,5,9,15,1,2,14,7,17,8,12], that a relying party may not necessarily completely trust the issuers of the credentials. Instead, these works advocate a model where the relying application may need multiple credentials to make its decisions, and has a non-trivial policy for the necessary credentials.…”
Section: Related Worksupporting
confidence: 70%
“…A very different approach is taken by PGP [22], where certificates define a `web of trust` and there is no central CA. We share the view advocated by many [22,4,5,9,15,1,2,14,7,17,8,12], that a relying party may not necessarily completely trust the issuers of the credentials. Instead, these works advocate a model where the relying application may need multiple credentials to make its decisions, and has a non-trivial policy for the necessary credentials.…”
Section: Related Worksupporting
confidence: 70%
“…A certificate is a digitally signed statement by which a certification authority (e.g., called trusted third party or introducer) asserts that a key is bound to an entity. The term "binding" is ambiguous [8] but for the purpose of this paper this is not relevant. The term public-key infrastructure (PKI) is used to refer to the complete legal, technical and organizational framework for drawing conclusions from a given set of certificates, trust relations and other pieces of evidence.…”
Section: Motivationmentioning
confidence: 99%
“…PKI designers need tools which can accurately evaluate the correctness of their designs and clearly illustrate what types of trust judgments their systems enable. The literature contains a number of approaches for applying formal methods to the PKI problem (e.g., [11,13,15,20,23]). The modeling work of Ueli Maurer [20] stands out, as it is simple, flexible, and is used to reason about PKI.…”
Section: Introductionmentioning
confidence: 99%