Modeling Public Key Infrastructures in the Real World

نویسندگان

  • John Marchesini
  • Sean W. Smith
چکیده

PKIs are complex distributed systems that are responsible for giving users enough information to make reasonable trust judgments about one another. Since the currencies of PKI are trust and certificates, users who make trust decisions (often called relying parties) must do so using only some initial trust beliefs about the PKI and some pile of certificates (and other assertions) they received from the PKI. Given a certificate, a relying party needs to conclude that the keyholder described by the certificate actually possesses the properties described by the certificate. In this paper, we present a calculus that allows relying parties to make such trust judgements. Our calculus extends Maurer’s deterministic model, and is focused on real world issues such as time, revocation, delegation, and heterogeneous certificate formats. We then demonstrate how our calculus can be used to reason about numerous situations that arise in practice.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

PKI Seeks a Trusting Relationship

All human co-operation is based on trust, meaning that we choose co-operation partners and make commitment decisions based on how much we trust the other party. Digital certificates and public-key infrastructures represent an attempt to mimic real-world human assessment of identity and trustworthiness in an automated and mechanical fashion, but present implementations are based on a very limite...

متن کامل

Smog, Cognition and Real-World Decision-Making

Cognitive functioning is critical as in our daily life a host of real-world complex decisions in high-stakes markets have to be made. The decision-making process can be vulnerable to environmental stressors. Summarizing the growing economic and epidemiologic evidence linking air pollution, cognition performance and real-world decision-making, we first illustrate key physiological and psychologi...

متن کامل

Hash Visualization : a New Techniqueto improve Real - World

Current security systems suuer from the fact that they fail to account for human factors. This paper considers two human limitations: First, people are slow and unreliable when comparing meaningless strings; and second , people have diiculties in remembering strong passwords or PINs. We identify two applications where these human factors negatively aaect security: Validation of root keys in pub...

متن کامل

Exploration du concept d ’ Infrastructures en tant que Services avec HIPerNET

With the expansion and convergence of communication and computing, dynamic provisioning of customized networking and processing infrastructures, as well as resource virtualization, are appealing concepts and technologies. Therefore, new models and tools are needed to allow users to create, trust and enjoy such on-demand virtual infrastructures within a wide area context. This research report pr...

متن کامل

Empirical Analysis of Certificate Revocation Lists

Managing public key certificates revocation has long been a central issue in public key infrastructures. Though various certificate revocation mechanisms have been proposed to address this issue, little effort has been devoted to the empirical analysis of real-world certificate revocation data. In this paper, we conduct such an empirical analysis based on a large amount of data collected from V...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005