메뉴 건너뛰기




Volumn 18, Issue 4, 2000, Pages 551-559

Reasoning about public-key certification: On bindings between entities and public keys

Author keywords

[No Author keywords available]

Indexed keywords

ELECTRONIC COMMERCE; SECURITY OF DATA;

EID: 0033749074     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/49.839931     Document Type: Article
Times cited : (14)

References (33)
  • 4
    • 0002863367 scopus 로고
    • Valuation of trust in open systems
    • D. Gollmann, Ed. Berlin: Springer-Verlag, Lecture Notes in Computer Science
    • T. Beth, M. Borcherding, and B. Klein, "Valuation of trust in open systems," in Computer Security - Esorics'94, D. Gollmann, Ed. Berlin: Springer-Verlag, 1994, vol. 875, Lecture Notes in Computer Science, pp. 3-18.
    • (1994) Computer Security - Esorics'94 , vol.875 , pp. 3-18
    • Beth, T.1    Borcherding, M.2    Klein, B.3
  • 6
    • 84958048748 scopus 로고    scopus 로고
    • Compliance checking in the policymaker trust management system
    • R. Hirschfeld, Ed. Berlin: Springer-Verlag, Lecture Notes in Computer Science
    • M. Blaze, J. Feigenbaum, and M. Strauss, "Compliance checking in the policymaker trust management system," in Financial Cryptography, R. Hirschfeld, Ed. Berlin: Springer-Verlag, 1998, vol. 1465, Lecture Notes in Computer Science, pp. 254-274.
    • (1998) Financial Cryptography , vol.1465 , pp. 254-274
    • Blaze, M.1    Feigenbaum, J.2    Strauss, M.3
  • 7
    • 0027612025 scopus 로고
    • Security architectures using formal methods
    • C. Boyd, "Security architectures using formal methods," IEEE J. Select. Areas Commun., vol. 11, pp. 694-701, 1993.
    • (1993) IEEE J. Select. Areas Commun. , vol.11 , pp. 694-701
    • Boyd, C.1
  • 10
    • 0031143168 scopus 로고    scopus 로고
    • Merging and extending the PGP and PEM trust models
    • May
    • D. Chadwick and A. Young, "Merging and extending the PGP and PEM trust models," IEEE Network Mag., May 1997.
    • (1997) IEEE Network Mag.
    • Chadwick, D.1    Young, A.2
  • 12
    • 85084160946 scopus 로고    scopus 로고
    • Establishing identity without certification authorities
    • San Jose, CA, July 22-25
    • C. Ellison, "Establishing identity without certification authorities," in 6th USENIX Security Symp., San Jose, CA, July 22-25, 1996, pp. 67-76.
    • (1996) 6th USENIX Security Symp. , pp. 67-76
    • Ellison, C.1
  • 14
    • 84958043633 scopus 로고    scopus 로고
    • Certificate revocation: Mechanisms and meaning
    • R. Hirschfeld, Ed. Berlin: Springer-Verlag, Lecture Notes in Computer Science
    • B. Fox and B. LaMaccia, "Certificate revocation: Mechanisms and meaning," in Financial Cryptography, R. Hirschfeld, Ed. Berlin: Springer-Verlag, 1998, vol. 1465, Lecture Notes in Computer Science, pp. 158-164.
    • (1998) Financial Cryptography , vol.1465 , pp. 158-164
    • Fox, B.1    LaMaccia, B.2
  • 17
    • 84958063551 scopus 로고    scopus 로고
    • On certificate revocation and validation
    • R. Hirschfeld, Ed. Berlin: Springer-Verlag, Lecture Notes in Computer Science
    • P. Kocher, "On certificate revocation and validation," in Financial Cryptography, R. Hirschfeld, Ed. Berlin: Springer-Verlag, 1998, vol. 1465, Lecture Notes in Computer Science, pp. 172-177.
    • (1998) Financial Cryptography , vol.1465 , pp. 172-177
    • Kocher, P.1
  • 18
    • 84976834054 scopus 로고
    • Authentication in distributed systems: Theory and practice
    • Nov
    • B. Lampson, M. Abadi, M. Burrows, and E. Wobber, "Authentication in distributed systems: Theory and practice," ACM Trans. Computer Syst., vol. 10, no. 4, pp. 265-310, Nov. 1992.
    • (1992) ACM Trans. Computer Syst. , vol.10 , Issue.4 , pp. 265-310
    • Lampson, B.1    Abadi, M.2    Burrows, M.3    Wobber, E.4
  • 20
    • 84947294004 scopus 로고    scopus 로고
    • Modeling a public-key infrastructure
    • E. Bertino, H. Kurth, G. Martella, and E. Montolivo, Eds. Berlin: Springer, LNCS, Lecture Notes in Computer Science
    • U. Maurer, "Modeling a public-key infrastructure," in Proc. 1996 European Symp. Res. Computer Security (ESORICS'96), E. Bertino, H. Kurth, G. Martella, and E. Montolivo, Eds. Berlin: Springer, LNCS, 1996, Lecture Notes in Computer Science, pp. 325-350.
    • (1996) Proc. 1996 European Symp. Res. Computer Security (ESORICS'96) , pp. 325-350
    • Maurer, U.1
  • 21
    • 0342446297 scopus 로고
    • A calculus for secure channel establishment in open networks
    • D. Gollmann, Ed., Lecture Notes in Computer Science
    • U. Maurer and P. Schmid, "A calculus for secure channel establishment in open networks," in Proc. 1994 European Symp. Res. Computer Security (ESORICS'94), D. Gollmann, Ed., 1994, vol. 875, Lecture Notes in Computer Science, pp. 175-192.
    • (1994) Proc. 1994 European Symp. Res. Computer Security (ESORICS'94) , vol.875 , pp. 175-192
    • Maurer, U.1    Schmid, P.2
  • 23
    • 84958056811 scopus 로고    scopus 로고
    • Revocation: Options and challenges
    • R. Hirschfeld, Ed. Berlin: Springer-Verlag, Lecture Notes in Computer Science
    • M. Myers, "Revocation: Options and challenges," in Financial Cryptography, R. Hirschfeld, Ed. Berlin: Springer-Verlag, 1998, vol. 1465, Lecture Notes in Computer Science, pp. 165-172.
    • (1998) Financial Cryptography , vol.1465 , pp. 165-172
    • Myers, M.1
  • 24
    • 85084162561 scopus 로고    scopus 로고
    • Certificate revocation and certificate update
    • Jan
    • M. Naor and K. Nissim, "Certificate revocation and certificate update," in Proc. Usenix'98, Jan. 1998, pp. 217-228.
    • (1998) Proc. Usenix'98 , pp. 217-228
    • Naor, M.1    Nissim, K.2
  • 26
    • 84958042111 scopus 로고    scopus 로고
    • Can we eliminate certificate revocation lists?
    • R. Hirschfeld, Ed
    • R. Rivest, "Can we eliminate certificate revocation lists?," in Proc. Financial Cryptography 1998, R. Hirschfeld, Ed., pp. 178-183.
    • (1998) Proc. Financial Cryptography 1998 , pp. 178-183
    • Rivest, R.1
  • 27
    • 0003614529 scopus 로고    scopus 로고
    • SDSI - A simple distributed security infrastructure
    • Online
    • R. Rivest and B. Lampson. SDSI - A simple distributed security infrastructure, presented at CRYPTO'96 Rumpsession. Online. Available: http://theory.lcs.mit.edu∧∼cis/sdsi.html
    • CRYPTO'96 Rumpsession
    • Rivest, R.1    Lampson, B.2
  • 30
    • 0027227136 scopus 로고
    • A logical language for specifying cryptographic protocols requirements
    • P. Syverson and C. Meadows, "A logical language for specifying cryptographic protocols requirements," in IEEE Conf. Research Security Privacy, 1993, pp. 165-180.
    • (1993) IEEE Conf. Research Security Privacy , pp. 165-180
    • Syverson, P.1    Meadows, C.2
  • 31
    • 84976844798 scopus 로고
    • What can we do about the unnecessary diversity of notation for syntactic definitions?
    • N. Wirth, "What can we do about the unnecessary diversity of notation for syntactic definitions?," Commun. ACM, vol. 20, no. 11, pp. 822-823, 1977.
    • (1977) Commun. ACM , vol.20 , Issue.11 , pp. 822-823
    • Wirth, N.1
  • 32
    • 0027266208 scopus 로고
    • Trust relationships in secure systems - A distributed authentication perspective
    • R. Yaholem, B. Klein, and T. Beth, "Trust relationships in secure systems - A distributed authentication perspective," in Proc. IEEE Conf. Research Security Privacy, 1993, pp. 150-164.
    • (1993) Proc. IEEE Conf. Research Security Privacy , pp. 150-164
    • Yaholem, R.1    Klein, B.2    Beth, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.