Browse by author
Lookup NU author(s): Omar Batarfi
Full text for this publication is not currently held within this repository. Alternative links are provided below where available.
Authentication of other parties on the Internet using a Public Key Infrastructure (PKI) is still an open area for research. The current authentication method consists of building a certification path connecting a trust anchor1 and the target, a public key to be validated. All the existing solutions cover the validation of a domain, which could be hierarchical, single, cross-certification or bridge , which holds the trust anchor and the target in the same domain of the CA root. Alternatively, the trust anchor and the target are in different domains but there is a link between the domains (cross-certification). This proposal presents a solution for domains that do not have a cross-certificate; therefore these domains could apply the proposed solution to authenticate their targets. In addition, a method for traversing and constructing a path will be presented.
Author(s): Batarfi O
Editor(s): Meersman, R., Tari, Z.
Publication type: Conference Proceedings (inc. Abstract)
Publication status: Published
Conference Name: On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops
Year of Conference: 2003
ISSN: 0302-9743 (Print) 1611-3349 (Online)
Library holdings: Search Newcastle University Library for this item
Series Title: Lecture Notes in Computer Science
Series Editor(s): Goos, G., Hartmanis, J., van Leeuwen, J.