Abstract | ||
---|---|---|
The growing number of PKIs (public key infrastructure) and the increasing number of situations where partners of a transaction may carry certificates signed by different CAs (certification authority) point out the problematic of trust between the different CAs. The degree to which a relying party can trust a CA depends upon the quality of its announced policy and its commitment to this policy. In this paper, we present an approach that helps a relying party to assess the quality of a certificate that is related to the quality of CA policy and its commitment to it. We integrate the role of relying party in the evaluation process. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1109/ICDIM.2008.4746813 | London |
Keywords | Field | DocType |
certification,public key cryptography,CA policy,PKI,X.509 certificate quality,certification authority,public key infrastructure | Certificate policy,Root certificate,Trusted third party,Computer science,Public key certificate,Computer security,Certificate authority,Certification path validation algorithm,Certification Practice Statement,Implicit certificate | Conference |
ISBN | Citations | PageRank |
978-1-4244-2917-2 | 0 | 0.34 |
References | Authors | |
4 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Ahmad Samer Wazan | 1 | 3 | 0.76 |
Romain Laborde | 2 | 162 | 28.88 |
Barrère, F. | 3 | 0 | 0.34 |
Abdelmalek Benzekri | 4 | 0 | 0.34 |