Abstract
PKIs are complex distributed systems that are responsible for giving users enough information to make reasonable trust judgments about one another. Since the currencies of PKI are trust and certificates, users who make trust decisions (often called relying parties) must do so using only some initial trust beliefs about the PKI and some pile of certificates (and other assertions) they received from the PKI. Given a certificate, a relying party needs to conclude that the keyholder described by the certificate actually possesses the properties described by the certificate. In this paper, we present a calculus that allows relying parties to make such trust judgements. Our calculus extends Maurer’s deterministic model, and is focused on real world issues such as time, revocation, delegation, and heterogeneous certificate formats. We then demonstrate how our calculus can be used to reason about numerous situations that arise in practice.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The KeyNote Trust-Management System, version 2. IETF RFC 2704 (September 1999)
Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The Role of Trust Management in Distributed Systems. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol. 1603, pp. 185–210. Springer, Heidelberg (1999)
Chadwick, D., Otenko, A., Ball, E.: Role-Based Access Control with X.509 Attribute Certificates. IEEE Internet Computing (March-April 2003)
Cooper, D.: A Model of Certificate Revocation. In: 15th Annual Computer Security Applications Conference (ACSAC 1999), Phoenix, Arizona, USA, December 1999, pp. 256–264. IEEE Computer Society, Los Alamitos (1999)
Ellison, C.: The nature of a usable pki. Computer Networks, 823–830 (1999)
Ellison, C.: Improvements on Conventional PKI Wisdom. In: Proceedings of the 1st Annual PKI Research Workshop (April 2002)
Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI Certificate Theory. IETF RFC 2693 (September 1999)
Farrell, S., Housley, R.: An Internet Attribute Certificate Profile for Authorization. IETF RFC 3281 (April 2002)
Goffee, N., Kim, S., Smith, S.W., Taylor, P., Zhao, M., Marchesini, J.: Greenpass: Decentralized, PKI-based Authorization for Wireless LANs. In: 3rd Annual PKI Research and Development Workshop. NIST (April 2004)
Housley, R., Polk, W., Ford, W., Solo, D.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. IETF RFC 3280 (April 2002)
Howell, J., Kotz, D.: A formal semantics for SPKI. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol. 1895, pp. 140–158. Springer, Heidelberg (2000)
Kocher, P.: On Certificate Revocation and Validation. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 172–177. Springer, Heidelberg (1998)
Kohlas, R., Maurer, U.: Reasoning About Public-Key Certification: On Bindings Between Entities and Public Keys. Journal on Selected Areas in Communications, 551–560 (2000)
Li, N., Grosof, B., Feigenbaum, J.: Delegation logic: A logic-based approach to distributed authorization. ACM Transactions on Information and System Security (TISSEC) 6(1), 128–171 (2003)
Li, N., Feigenbaum, J.: Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357, pp. 166–177. Springer, Heidelberg (2003)
Li, N., Winsborough, W., Mitchell, J.: Beyond Proof-of-compliance: Safety and Availability Analysis in Trust Management. In: Proceedings of 2003 IEEE Symposium on Security and Privacy, pp. 123–139. IEEE Computer Society Press, Los Alamitos (2003)
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 164–173. IEEE Computer Society Press, Los Alamitos (1996)
Blaze, M., Feigenbaum, J., Strauss, M.J.: Compliance Checking in the PolicyMaker Trust Management System. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 254–274. Springer, Heidelberg (1998)
Malpani, A., Galperin, S., Mayers, M., Ankney, R., Adams, C.: X.509 Internet Public Key Infrastructure Online Certificate Status Protocol. RFC2560 (June 1999), http://www.ietf.org/rfc/rfc2560.txt
Maurer, U.: Modelling a Public-Key Infrastructure. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, Springer, Heidelberg (1996)
Naor, M., Nissim, K.: Certificate Revocation and Certificate Update. IEEE Journal on Selected Areas in Communications 18(4), 561–570 (2000)
Novotny, J., Tueke, S., Welch, V.: An Online Credential Repository for the Grid: MyProxy. In: Proceedings of the Tenth International Symposium on High Performance Distributed Computing (HPDC-10), IEEE Press, Los Alamitos (2001)
Smith, S.W.: Outbound Authentication for Programmable Secure Coprocessors. International Journal on Information Security (2004)
Tuecke, S., Welch, V., Engert, D., Pearlman, L., Thompson, M.: Internet X.509 Public Key Infrastructure Proxy Certificate Profile (2003), http://www.ietf.org/internet-drafts/draft-ietf-pkix-proxy-10.txt
Weeks, S.: Understanding Trust Management Systems. In: Proceedings of 2001 IEEE Symposium on Security and Privacy, pp. 94–105. IEEE Computer Society Press, Los Alamitos (2001)
Welch, V., Foster, I., Kesselman, C., Mulmo, O., Pearlman, L., Tuecke, S., Gawor, J., Meder, S., Siebenlist, F.: X.509 Proxy Certificates for Dynamic Delegation. In: 3rd Annual PKI Research and Development Workshop (April 2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Marchesini, J., Smith, S. (2005). Modeling Public Key Infrastructures in the Real World. In: Chadwick, D., Zhao, G. (eds) Public Key Infrastructure. EuroPKI 2005. Lecture Notes in Computer Science, vol 3545. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11533733_8
Download citation
DOI: https://doi.org/10.1007/11533733_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28062-0
Online ISBN: 978-3-540-31585-8
eBook Packages: Computer ScienceComputer Science (R0)