Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Public Key Infrastructures That Safisfy Security Goals

Published

Author(s)

William T. Polk, Nelson E. Hastings, A Malpani

Abstract

This article describes the features of different PKI architectures, and the motivations behind their use. While some PKI architectures (e.g., hierarchies) are very simple, political and social realities encourage deployment of more complex (e.g., mesh) PKIs. The validation authority is a direct response to the complexity of these architectures and an opportunity for organizational control. The movement towards interconnection of PKIs using Bridge CAs gains momentum as organizations seek to leverage their infrastructure investments. The complexity of the resulting PKIs provides incentives for deployment of shared validation authorities, relinquishing organizational control for economies of scale
Citation
IEEE Internet Computing
Volume
7
Issue
No. 4

Keywords

bridge certificate authority, centralized validation authority, certification authority, cryptography, localized validation authority, public key infrastructure, validation authority

Citation

Polk, W. , Hastings, N. and Malpani, A. (2003), Public Key Infrastructures That Safisfy Security Goals, IEEE Internet Computing (Accessed December 4, 2024)

Issues

If you have any questions about this publication or are having problems accessing it, please contact reflib@nist.gov.

Created July 1, 2003, Updated February 17, 2017