10.1145/352600.352615acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article
Free Access

Which PKI (public key infrastructure) is the right one? (panel session)

Authors Info & Claims
Online:01 November 2000Publication History
First page image

References

  1. 1.M. Burmester, Y. Desmedt, and G. Kabatianskii. Trust and security: A new look at the Byzantine generals problem. In R. N. Wright and P. G. Neumann, editors, Network Threats, DIMACS, Series in Discrete Mathematics and Theoretical Computer Science, December 2-4, 1996, vol. 38. AMS, 1998.Google ScholarGoogle Scholar
  2. 2.M. Burmester and Y. Desmedt. Secure communication in an unknown network using certificates. In K. Y. Lam, E. Okamoto, and C. Xing, editors, Advances in Cryptology: Asiacrypt '99, Proceedings (Lecture Notes in Computer Science 1716), pages 274-287. Springer-Verlag, November 14-18, 1999, Singapore. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.Cren's certificate authority service. http://www.cren.net/ca/index.html.Google ScholarGoogle Scholar
  4. 4.Cyber security budget initiatives. http://www.whitehouse.gov/WH/New/html/20000215_1.ht ml, February 15, 2000.Google ScholarGoogle Scholar
  5. 5.D. Dolev, C. Dwork, O. Waarts, and M. Yung. Perfectly secure message transmission. Journal of the ACM, 40(1):17-47, January 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.C. Ellison and B. Schneier. Ten risks of PKI: What you're not being told about Public Key Infrastructure. Computer Security Journal, 16(1):1-7, 2000. See also http://www.counterpane.com/pki-risks.html.Google ScholarGoogle Scholar
  7. 7.D. Goodenough. A Heretic's view of Certificates. www.DGA.co.uk/CredGoogle ScholarGoogle Scholar
  8. 8.M. K. Reiter and S. G. Stubblebine. Path independence for authentication in large scale systems. In Proceedings of the 4th ACM Conference on Computer and Communications Security, pages 57-66, April 1997, Zurich. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.R. L. Rivest and B. Lampson. SDSI:a simple distributed security infrastructure. http://theory.lcs.mit.edu/~cis/sdsi.html.Google ScholarGoogle Scholar
  10. 10.P. R. Zimmermann. The Official PGP User's Guide. MIT Press, Cambridge, Massachusetts, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Which PKI (public key infrastructure) is the right one? (panel session)

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        ACM Conferences cover image
        CCS '00: Proceedings of the 7th ACM conference on Computer and Communications Security
        November 2000
        255 pages
        ISBN:1581132034
        DOI:10.1145/352600

        Copyright © 2000 ACM

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Online: 1 November 2000

        Permissions

        Request permissions about this article.

        Request Permissions

        Qualifiers

        • Article

        Acceptance Rates

        CCS '00 Paper Acceptance Rate 28 of 132 submissions, 21%
        Overall Acceptance Rate 720 of 3,964 submissions, 18%

        Upcoming Conference

        CCS '22

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!