Abstract
A basic function of all signatures, digital or not, is to express trust and authority, explicit or implied. This is especially the case with digital signatures used in certificates. In this paper, we study the trust relationships expressed by the certificates used in X.509, PGP and SPKI. Especially, we present and revise the idea of a certificate loop, or a loop of certificates from the verifying party to the communicating peer, requesting access or acceptance. We also show how that kind of certificate loops can be used to explicitly express security policy decisions. In the end of the paper, we briefly describe our own SPKI implementation that is specially tailored towards policy management. The implementation is based on Java and build using Design Patterns. It functions as a separate process, providing security services to the local kernel and applications.
Original language | English |
---|---|
Title of host publication | Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings |
Publisher | Springer |
Pages | 84-98 |
Number of pages | 15 |
ISBN (Print) | 3540646930, 9783540646938 |
DOIs | |
Publication status | Published - 1 Jan 1998 |
MoE publication type | A4 Conference publication |
Event | International Workshop on Practice and Theory in Public Key Cryptography - Pacifico Yokohama, Japan Duration: 5 Feb 1998 → 6 Feb 1998 Conference number: 1 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 1431 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Workshop
Workshop | International Workshop on Practice and Theory in Public Key Cryptography |
---|---|
Abbreviated title | PKC |
Country/Territory | Japan |
City | Pacifico Yokohama |
Period | 05/02/1998 → 06/02/1998 |