Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker

被引:5
作者
Wazan, Ahmad Samer [1 ]
Laborde, Romain [1 ]
Chadwick, David W. [2 ]
Barrere, Francois [1 ]
Benzekri, Abdelmalek [1 ]
Kaiiali, Mustafa [3 ]
Habbal, Adib [4 ]
机构
[1] Paul Sabatier Univ, Toulouse, France
[2] Univ Kent, Canterbury, Kent, England
[3] Queens Univ, Belfast, Antrim, North Ireland
[4] Univ Utara Malaysia, Kedah, Malaysia
关键词
Security of data;
D O I
10.1155/2017/6907146
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A Public Key Infrastructure (PKI) is considered one of the most important techniques used to propagate trust in authentication over the Internet. This technology is based on a trust model defined by the original X.509 (1988) standard and is composed of three entities: the certification authority (CA), the certificate holder (or subject), and the Relying Party (RP). The CA plays the role of a trusted third party between the certificate holder and the RP. In many use cases, this trust model has worked successfully. However, we argue that the application of this model on the Internet implies that web users need to depend on almost anyone in the world in order to use PKI technology. Thus, we believe that the current TLS system is not fit for purpose and must be revisited as a whole. In response, the latest draft edition of X.509 has proposed a new trust model by adding new entity called the Trust Broker (TB). In this paper, we present an implementation approach that a Trust Broker could follow in order to give RPs trust information about a CA by assessing the quality of its issued certificates. This is related to the quality of the CA's policies and procedures and its commitment to them. Finally, we present our Trust Broker implementation that demonstrates how RPs can make informed decisions about certificate holders in the context of the global web, without requiring large processing resources themselves.
引用
收藏
页数:23
相关论文
共 35 条
[1]  
[Anonymous], 1988, TRUST MAKING BREAKIN
[2]  
[Anonymous], 2012, P 2012 ACM C COMP CO
[3]  
[Anonymous], 2006, P SIGCHI C HUM FACT, DOI 10.1145/1124772.1124861
[4]  
[Anonymous], 1983, The Logic and Limits of Trust
[5]  
[Anonymous], 1994, Formalizing trust as a computational concept
[6]   TRUST AND ANTITRUST [J].
BAIER, A .
ETHICS, 1986, 96 (02) :231-260
[7]  
Biddle R., 2009, P 2009 ACM WORKSH CL, P19, DOI [10.1145/1655008.1655012, DOI 10.1145/1655008.1655012]
[8]  
CABrowser Forum, GUID ISS MAN EXT VAL
[9]   Evaluating trust in a public key certification authority [J].
Chadwick, DW ;
Basden, A .
COMPUTERS & SECURITY, 2001, 20 (07) :592-611
[10]  
Chuat L, 2015, IEEE CONF COMM NETW, P415, DOI 10.1109/CNS.2015.7346853