Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2889))

  • 467 Accesses

Abstract

Authentication of other parties on the Internet using a Public Key Infrastructure (PKI) is still an open area for research. The current authentication method consists of building a certification path connecting a trust anchor and the target, a public key to be validated. All the existing solutions cover the validation of a domain, which could be hierarchical, single, cross-certification or bridge [1], which holds the trust anchor and the target in the same domain of the CA root. Alternatively, the trust anchor and the target are in different domains but there is a link between the domains (cross-certification). This proposal presents a solution for domains that do not have a cross-certificate; therefore these domains could apply the proposed solution to authenticate their targets. In addition, a method for traversing and constructing a path will be presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Komar, B.: Troubleshooting Certificate Status and Revocation, p. 64 (2001)

    Google Scholar 

  2. Lloyd, S.: Understanding Certification Path Construction, p. 14 (2002)

    Google Scholar 

  3. Olson, D.: Certificate Authority issues, p. 7 (2001)

    Google Scholar 

  4. Xenitellis, S.: The open-source PKI Book: A guide to PKIs and open-source Implementation (2000)

    Google Scholar 

  5. Union, I.T.: ITU-T RECOMMENDATION X.509 | ISO/IEC 9594-8: INFORMATION TECHNOLOGY - OPEN SYSTEMS INTERCONNECTION - THE DIRECTORY PUBLIC-KEY AND ATTRIBUTE CERTIFICATE FRAMEWORKS, p. 162 (2001)

    Google Scholar 

  6. Alexandre, R., Silva, M.A.S.: Pequi: A PKIX Implementation for Secure Communication. p. 11

    Google Scholar 

  7. SPKI (Simple Public Key Infrastructure), p. 33 (2000)

    Google Scholar 

  8. Commission, T.E.: Guidelines, Methodologies and Standards to set up a CA for Digital Signatures, p. 103

    Google Scholar 

  9. Ltd, D.C., DIRECTORY SERVICES - THE ROLE OF LDAP AND X.500. p. 6

    Google Scholar 

  10. Chokhani, S., Ford, W., Sabett, R., Merrill, C., Wu, S.: Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework, p. 76 (2003)

    Google Scholar 

  11. Arsenault, A., Turner, S.: Internet X.509 Public Key Infrastructure: Roadmap, p. 57 (2002)

    Google Scholar 

  12. Elley, Y., Anderson, A., Hanna, S., Mullan, S., Perlman, R., Proctor, S.: Building Certification Paths: Forward vs. Reverse. p. 8

    Google Scholar 

  13. Zhanna Reznikova, B.R.: USING INFORMATION THEORY APPROACH TO STUDY THE COMMUNICATION SYSTEM AND NUMERICAL COMPETENCE IN ANTS. p. 8

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Batarfi, O. (2003). Certificate Validation in Untrusted Domains. In: Meersman, R., Tari, Z. (eds) On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops. OTM 2003. Lecture Notes in Computer Science, vol 2889. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39962-9_101

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-39962-9_101

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20494-7

  • Online ISBN: 978-3-540-39962-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics