Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Author(s):||William T. Polk; Nelson E. Hastings; A Malpani;|
|Title:||Public Key Infrastructures That Safisfy Security Goals|
|Published:||July 01, 2003|
|Abstract:||This article describes the features of different PKI architectures, and the motivations behind their use. While some PKI architectures (e.g., hierarchies) are very simple, political and social realities encourage deployment of more complex (e.g., mesh) PKIs. The validation authority is a direct response to the complexity of these architectures and an opportunity for organizational control. The movement towards interconnection of PKIs using Bridge CAs gains momentum as organizations seek to leverage their infrastructure investments. The complexity of the resulting PKIs provides incentives for deployment of shared validation authorities, relinquishing organizational control for economies of scale|
|Citation:||IEEE Internet Computing|
|Keywords:||bridge certificate authority,centralized validation authority,certification authority,cryptography,localized validation authority,public key infrastructure,validation authority|