How to Incorporate Revocation Status Information into the Trust Metrics for Public-Key Certification

K. Bicakci, B. Crispo, A.S. Tanenbaum

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

In a traditional PKI, the trust associated with a public key is expressed in binary either by 0 or 1. Alternatively, several authors have proposed trust metrics to evaluate the confidence afforded by a public key. However their work has a static point of view and does not take into account the issue of public key revocation. In this paper, we make the first attempt to incorporate the revocation status information into the trust metrics for public key certification. To achieve our goal, we use a tailored form of a vector of trust model recently proposed. This would allow us to reason formally about when there is a need to check revocation status and how reliable the revocation mechanism should be in a given security application. Copyright 2005 ACM.
Original languageEnglish
Title of host publicationApplied Computing 2005 - Proceedings of the 20th Annual ACM Symposium on Applied Computing
Pages1594-1598
Number of pages5
Volume2
DOIs
Publication statusPublished - 2005
Event20th Annual ACM Symposium on Applied Computing - Santa Fe, United States
Duration: 13 Mar 200517 Mar 2005

Conference

Conference20th Annual ACM Symposium on Applied Computing
Country/TerritoryUnited States
CitySanta Fe
Period13/03/0517/03/05

Keywords

  • PKI
  • Public Key Certificates
  • Revocation
  • Trust Metrics

Fingerprint

Dive into the research topics of 'How to Incorporate Revocation Status Information into the Trust Metrics for Public-Key Certification'. Together they form a unique fingerprint.

Cite this