Establishing and managing trust within the public key infrastructure

被引:14
作者
Lekkas, D [1 ]
机构
[1] Univ Aegean, Dept Prod & Syst, Syros Isl 84100, Greece
关键词
trust; security; quality; qualified policy; trusted third party;
D O I
10.1016/S0140-3664(03)00077-X
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The capabilities afforded by the Public Key Infrastructure certainly facilitate the growth of secure internet-based transactions. However, the provision of acceptable and effective certification services will only be achieved when an enhanced level of trust is established between the entities involved. Trust in the information society is built on various different grounds, based on calculus, on knowledge or on social reasons. The notion of trust against a Trusted Third Party expresses the customer's faith in specific operational, ethical and quality characteristics, while it also includes the acknowledgement of a minimum risk factor by the relying party. Trust has the properties of selectivity and transitivity and therefore it must be properly delimited and restricted. The trust relationships have to be effectively managed at the client side, where a trust database shall be maintained in three abstract levels, containing all the necessary information to enumerate, distinguish and evaluate the relationships with other entities. The major factors that affect trust are reflected in the requirements for quality of the services provided and in the terms and conditions of qualified policies. (C) 2003 Elsevier B.V. All rights reserved.
引用
收藏
页码:1815 / 1825
页数:11
相关论文
共 18 条
[1]   The US Federal PKI and the Federal Bridge Certification Authority [J].
Alterman, P .
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2001, 37 (06) :685-690
[2]  
[Anonymous], TOTAL QUALITY MANAGE
[3]   Establishing online trust through a community responsibility system [J].
Ba, SL .
DECISION SUPPORT SYSTEMS, 2001, 31 (03) :323-336
[4]   Evaluating trust in a public key certification authority [J].
Chadwick, DW ;
Basden, A .
COMPUTERS & SECURITY, 2001, 20 (07) :592-611
[5]  
CHOKHANI S, 1999, 2527 IETF
[6]  
*ETSI, 2001, 101456 TS ETSI
[7]  
FARRUKH A, 2001, CEN ISSS WORKSH EL S
[8]   Risking "trust" in a public key infrastructure: old techniques of managing risk applied to new technology [J].
Fernandes, AD .
DECISION SUPPORT SYSTEMS, 2001, 31 (03) :303-322
[9]  
Giddens Anthony, 1991, CONSEQUENCES MODERNI, p[29, 92]
[10]   Securing the electronic market:: The KEYSTONE Public Key Infrastructure architecture [J].
Gritzalis, S ;
Katsikas, SK ;
Lekkas, D ;
Moulinos, K ;
Polydorou, E .
COMPUTERS & SECURITY, 2000, 19 (08) :731-746