Determining the authenticity of public keys in large-scale open networks cannot be based on certificates alone, but must also include the binding between the key used for certification and it’s owner, as well as the trust relationships between individual agents. This paper describes a method for computing authenticity measures based on certificates, on key binding, and on trust relationships. Two essential elements of the method are the opinion model which is a radically new way of representing trust, and subjective logic which consists of a set of logical operators for combining opinions. We show that our method for computing authenticity measures can be applied to both anarchic and hierarchic authentication networks.
CITATION STYLE
Jøsang, A. (1998). A subjective metric of authentication. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1485, pp. 329–344). Springer Verlag. https://doi.org/10.1007/BFb0055873
Mendeley helps you to discover research relevant for your work.