Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/647216.720552guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

KeyNote: Trust Management for Public-Key Infrastructures (Position Paper)

Published: 15 April 1998 Publication History

Abstract

This paper discusses the rationale for designing a simple trust-management system for public-key infrastructures, called KeyNote. The motivating principles are expressibility, simplicity, and extensibility. We believe that none of the existing public-key infrastructure proposals provide as good a combination of these three factors.

References

[1]
M. Blaze, J. Feigenbaum, and A. D. Keromytis, "The KeyNote Trust Management System," work in progress. Internet Draft, April 1998, http://www.cis.upenn.edu/~angelos/draft-angelos-spki-keynote.txt.gz.
[2]
M. Blaze, J. Feigenbaum, and J. Lacy, "Decentralized Trust Management," in Proceedings of the 17th Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos, 1996, pp. 164-173.
[3]
M. Blaze, J. Feigenbaum, and M. Strauss, "Compliance Checking in the PolicyMaker Trust Management System," in Proceedings of the 2nd Financial Crypto Conference, Lecture Notes in Computer Science, Springer, Berlin, 1998, to appear. Available in preprint form as AT&T Technical Report 98.3.2, http://www.research.att.com/library/trs/TRs/98/98.3/98.3.2.body.ps.
[4]
C. Ellison, A Simple Public-Key Infrastructure, http://www.clark.net/pub/cme/html/spki.html.
[5]
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen, "SPKI Certificate Theory," http://www.clark.net/pub/cme/theory.txt
[6]
R. Rivest and B. Lampson, SDSI: A Simple Distributed Security Infrastructure, http://theory.lcs.mit.edu/~rivest/sdsi11.html.
[7]
Consultation Committee, X.509: The Directory Authentication Framework, International Telephone and Telegraph, International Telecommunications Union, Geneva, 1989.

Cited By

View all
  • (2019)WAVEProceedings of the 28th USENIX Conference on Security Symposium10.5555/3361338.3361434(1375-1392)Online publication date: 14-Aug-2019
  • (2017)Enabling Trust Assessment In Clouds-of-CloudsProceedings of the 12th International Conference on Availability, Reliability and Security10.1145/3098954.3098970(1-9)Online publication date: 29-Aug-2017
  • (2016)DiplomatProceedings of the 13th Usenix Conference on Networked Systems Design and Implementation10.5555/2930611.2930648(567-581)Online publication date: 16-Mar-2016
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
Proceedings of the 6th International Workshop on Security Protocols
April 1998
236 pages

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 15 April 1998

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2019)WAVEProceedings of the 28th USENIX Conference on Security Symposium10.5555/3361338.3361434(1375-1392)Online publication date: 14-Aug-2019
  • (2017)Enabling Trust Assessment In Clouds-of-CloudsProceedings of the 12th International Conference on Availability, Reliability and Security10.1145/3098954.3098970(1-9)Online publication date: 29-Aug-2017
  • (2016)DiplomatProceedings of the 13th Usenix Conference on Networked Systems Design and Implementation10.5555/2930611.2930648(567-581)Online publication date: 16-Mar-2016
  • (2016)Authorizing Network Control at Software Defined Internet Exchange PointsProceedings of the Symposium on SDN Research10.1145/2890955.2890956(1-6)Online publication date: 14-Mar-2016
  • (2016)AppPAL for AndroidProceedings of the 8th International Symposium on Engineering Secure Software and Systems - Volume 963910.1007/978-3-319-30806-7_14(216-232)Online publication date: 6-Apr-2016
  • (2015)How Close are We to Realizing a Pragmatic VANET Solution? A Meta-SurveyACM Computing Surveys10.1145/281755248:2(1-40)Online publication date: 3-Nov-2015
  • (2015)An authorization model for cross-enterprise collaborationsSecurity and Communication Networks10.1002/sec.10008:4(523-539)Online publication date: 10-Mar-2015
  • (2014)On Designing Usable Policy Languages for Declarative Trust AggregationProceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust - Volume 853310.1007/978-3-319-07620-1_5(45-56)Online publication date: 22-Jun-2014
  • (2013)A formal distributed network monitoring approach for enhancing trust management systemsProceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems10.1145/2536146.2536160(76-83)Online publication date: 28-Oct-2013
  • (2013)Trust management of services in cloud environmentsACM Computing Surveys10.1145/2522968.252298046:1(1-30)Online publication date: 11-Jul-2013
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media