Advertisement

KeyNote: Trust Management for Public-Key Infrastructures

Position Paper
  • Matt Blaze
  • Joan Feigenbaum
  • Angelos D. Keromytis
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1550)

Abstract

This paper discusses the rationale for designing a simple trust-management system for public-key infrastructures, called KeyNote. The motivating principles are expressibility, simplicity, and extensibility. We believe that none of the existing public-key infrastructure proposals provide as good a combination of these three factors.

Keywords

Trust Management Action String Compliance Check Internet Draft Acceptance Record 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    M. Blaze, J. Feigenbaum, and A. D. Keromytis, “The KeyNote Trust Management System,“ work in progress. Internet Draft, April 1998, http://www.cis.upenn.edu/~angelos/draft-angelos-spki-keynote.txt.gz.
  2. 2.
    M. Blaze, J. Feigenbaum, and J. Lacy, “Decentralized Trust Management,” in Proceedings of the 17th Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos, 1996, pp. 164–173.Google Scholar
  3. 3.
    M. Blaze, J. Feigenbaum, and M. Strauss, “Compliance Checking in the PolicyMaker Trust Management System,“ in Proceedings of the 2nd Financial Crypto Conference, Lecture Notes in Computer Science, Springer, Berlin, 1998, to appear. Available in preprint form as AT&T Technical Report 98.3.2, http://www.research.att.com/library/trs/TRs/98/98.3/98.3.2.body.ps.Google Scholar
  4. 4.
    C. Ellison, A Simple Public-Key Infrastructure, http://www.clark.net/pub/cme/html/spki.html.
  5. 5.
    C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen, “SPKI Certificate Theory,” http://www.clark.net/pub/cme/theory.txt
  6. 6.
    R. Rivest and B. Lampson, SDSI: A Simple Distributed Security Infrastructure, http://theory.lcs.mit.edu/~rivest/sdsi11.html.
  7. 7.
    Consultation Committee, X.509: The Directory Authentication Framework, International Telephone and Telegraph, International Telecommunications Union, Geneva, 1989.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Matt Blaze
    • 1
  • Joan Feigenbaum
    • 1
  • Angelos D. Keromytis
    • 2
  1. 1.AT&T Labs — ResearchFlorham ParkUSA
  2. 2.Distributed Systems Lab CIS DepartmentUniversity of PennsylvaniaPhiladelphiaUSA

Personalised recommendations