Skip to main content
Kent Academic Repository

Trust Models in ICE-TEL

Young, Andrew J. and Kapidzic Cicovic, Nada and Chadwick, David W. (1997) Trust Models in ICE-TEL. In: Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security. IEEE, pp. 122-133. ISBN 0-8186-7767-8. (doi:10.1109/NDSS.1997.579230) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21535)

The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided.
Official URL:
http://dx.doi.org/10.1109/NDSS.1997.579230

Abstract

Public key certification provides mechanisms that can be used to build truly scaleable security services, such as allowing people who have never met to have assurance of each other's identity. Authentication involves syntactic verification of a certificate chain followed by a semantic look at the policies under which the certificates were issued. This results in a level of assurance that the identity of the person to be authenticated is an accurate description of the person involved, and requires verifiers to specify who they trust and what they trust them to do. Two widely discussed mechanisms for specifying this trust, the PEM and PGP trust models, approach the problem from fundamentally different directions. The EC funded ICE-TEL project, which is deploying a security infrastructure and application set for the European research community, has described a new trust model that attempts to be equally applicable to organisation-centric PEM users and user-centric PGP users.

Item Type: Book section
DOI/Identification number: 10.1109/NDSS.1997.579230
Uncontrolled keywords: public key; certification; computer security; authentication; costs; public key cryptography; advertising; world wide web; information security; packaging
Subjects: Q Science > QA Mathematics (inc Computing science) > QA 76 Software, computer programming,
Divisions: Divisions > Division of Computing, Engineering and Mathematical Sciences > School of Computing
Depositing User: Mark Wheadon
Date Deposited: 25 Jul 2009 18:08 UTC
Last Modified: 16 Nov 2021 09:59 UTC
Resource URI: https://kar.kent.ac.uk/id/eprint/21535 (The current URI for this page, for reference purposes)

University of Kent Author Information

  • Depositors only (login required):

Total unique views for this document in KAR since July 2020. For more details click on the image.