Certificate validation in untrusted domains

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Authentication of other parties on the Internet using a Public Key Infrastructure (PKI) is still an open area for research. The current authentication method consists of building a certification path connecting a trust anchor1 and the target, a public key to be validated. All the existing solutions cover the validation of a domain, which could be hierarchical, single, cross-certification or bridge [1], which holds the trust anchor and the target in the same domain of the CA root. Alternatively, the trust anchor and the target are in different domains but there is a link between the domains (cross-certification). This proposal presents a solution for domains that do not have a cross-certificate; therefore these domains could apply the proposed solution to authenticate their targets. In addition, a method for traversing and constructing a path will be presented. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Batarfi, O. (2003). Certificate validation in untrusted domains. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2889, 1057–1068. https://doi.org/10.1007/978-3-540-39962-9_101

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free