Establishing and managing trust within the public key infrastructure

被引:12
|
作者
Lekkas, D [1 ]
机构
[1] Univ Aegean, Dept Prod & Syst, Syros Isl 84100, Greece
关键词
trust; security; quality; qualified policy; trusted third party;
D O I
10.1016/S0140-3664(03)00077-X
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The capabilities afforded by the Public Key Infrastructure certainly facilitate the growth of secure internet-based transactions. However, the provision of acceptable and effective certification services will only be achieved when an enhanced level of trust is established between the entities involved. Trust in the information society is built on various different grounds, based on calculus, on knowledge or on social reasons. The notion of trust against a Trusted Third Party expresses the customer's faith in specific operational, ethical and quality characteristics, while it also includes the acknowledgement of a minimum risk factor by the relying party. Trust has the properties of selectivity and transitivity and therefore it must be properly delimited and restricted. The trust relationships have to be effectively managed at the client side, where a trust database shall be maintained in three abstract levels, containing all the necessary information to enumerate, distinguish and evaluate the relationships with other entities. The major factors that affect trust are reflected in the requirements for quality of the services provided and in the terms and conditions of qualified policies. (C) 2003 Elsevier B.V. All rights reserved.
引用
收藏
页码:1815 / 1825
页数:11
相关论文
共 50 条
  • [1] An anatomy of trust in public key infrastructure
    Huang J.
    Nicol D.M.
    [J]. International Journal of Critical Infrastructures, 2017, 13 (2-3) : 238 - 258
  • [2] Risking "trust" in a public key infrastructure: old techniques of managing risk applied to new technology
    Fernandes, AD
    [J]. DECISION SUPPORT SYSTEMS, 2001, 31 (03) : 303 - 322
  • [3] Reasoning about trust and insurance in a public key infrastructure
    Millen, JK
    Wright, RN
    [J]. 13TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2000, : 16 - 22
  • [4] An efficient, dynamic and trust preserving public key infrastructure
    Levi, A
    Caglayan, MU
    [J]. 2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2000, : 203 - 214
  • [5] Trust coercion in the name of usable public key infrastructure
    Zissis, Dimitrios
    Lekkas, Dimitrios
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 1734 - 1745
  • [6] Be Careful Who You Trust: Issues with the Public Key Infrastructure
    Black, Paul
    Layton, Robert
    [J]. 2014 5TH CYBERCRIME AND TRUSTWORTHY COMPUTING CONFERENCE CTC, 2014, : 12 - 21
  • [7] AutoPKI: public key infrastructure for IoT with automated trust transfer
    Hoglund, Joel
    Bouget, Simon
    Furuhed, Martin
    Mattsson, John Preuss
    Selander, Goran
    Raza, Shahid
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (03) : 1859 - 1875
  • [8] Knowledge issues raised in modelling trust in a public key infrastructure
    Basden, A
    Ball, E
    Chadwick, DW
    [J]. EXPERT SYSTEMS, 2001, 18 (05) : 233 - 249
  • [9] Public Key Infrastructure: managing the e-Business security
    Lai, XJ
    [J]. INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 505 - 505
  • [10] Building Trust In Cloud Using Public Key Infrastructure A step towards cloud trust
    Kharche, Heena
    Chouhan, Deepak Singh
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (03) : 26 - 31