How to incorporate revocation status information into the trust metrics for public-key certification

Kemal Bicakci*, Bruno Crispo, Andrew S. Tanenbaum

*Corresponding author for this work

Research output: Contribution to conferencePaperpeer-review

8 Citations (Scopus)

Abstract

In a traditional PKI, the trust associated with a public key is expressed in binary either by 0 or 1. Alternatively, several authors have proposed trust metrics to evaluate the confidence afforded by a public key. However their work has a static point of view and does not take into account the issue of public key revocation. In this paper, we make the first attempt to incorporate the revocation status information into the trust metrics for public key certification. To achieve our goal, we use a tailored form of a vector of trust model recently proposed. This would allow us to reason formally about when there is a need to check revocation status and how reliable the revocation mechanism should be in a given security application.

Original languageEnglish
Pages1594-1598
Number of pages5
DOIs
Publication statusPublished - 2005
Externally publishedYes
Event20th Annual ACM Symposium on Applied Computing - Santa Fe, NM, United States
Duration: 13 Mar 200517 Mar 2005

Conference

Conference20th Annual ACM Symposium on Applied Computing
Country/TerritoryUnited States
CitySanta Fe, NM
Period13/03/0517/03/05

Keywords

  • PKI
  • Public Key Certificates
  • Revocation
  • Trust Metrics

Fingerprint

Dive into the research topics of 'How to incorporate revocation status information into the trust metrics for public-key certification'. Together they form a unique fingerprint.

Cite this