The EuroPKI Experience

  • Antonio Lioy
  • Marius Marian
  • Natalia Moltchanova
  • Massimiliano Pala
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3093)


This paper discusses the technical and management experience gained in the day-by-day operation of the EuroPKI infrastructure. First the context where EuroPKI was born is explained, along with its certification philosophy. Then common certification practices are discussed, along with description of the services and applications offered by the EuroPKI partners. User-reported problems are also listed and discussed in order to identify the issues that hamper large scale adoption of public-key certificates. The article closes with an overview of the EuroPKI activity plans and perspective.


Registration Authority Access Control List Common Name Client Authentication Trust Anchor 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Adams, C., Farrell, S.: Internet X.509 Public Key Infrastructure Certificate Management Protocols. RFC-2510 (March 1999)Google Scholar
  2. 2.
    Polk, W.T., Hastings, N.E.: Bridge Certification Authorities: Connecting B2B Public Key Infrastructures. NIST (September 2000)Google Scholar
  3. 3.
    EuroPKI Certificate Policy - Version 1.1. EuroPKI website,
  4. 4.
    Chokhani, S., Ford, W.: Certificate Policy and Certification Practices Framework. RFC-2527 (March 1999)Google Scholar
  5. 5.
    Housley, R., Polk, W., Ford, W., Solo, D.: Certificate and Certificate Revocation List (CRL) Profile. RFC-3280 (2002)Google Scholar
  6. 6.
    Myers, M., Ankney, R., Malpani, A., Galperin, S., Adams, C.: Online Certificate Status Protocol - OCSP. RFC-2560 (June 1999)Google Scholar
  7. 7.
    RSA Laboratories: PKCS#12: Personal Information Exchange Syntax Standard. Version 1.0, June 24 (1999)Google Scholar
  8. 8.
    RSA Laboratories: PKCS#11: Conformance Profile Specification. Version 2.11, October 1 (2000)Google Scholar
  9. 9.
    Adams, C., Cain, P., Pinkas, D., Zuccherato, R.: Time-Stamp Protocol (TSP). RFC- 3161 (August 2001)Google Scholar
  10. 10.
    Alvestrand, H.: IETF Policy on Character Sets and Languages. RFC-2277 (January 1998)Google Scholar
  11. 11.
    ISO/IEC: Information Technology - Universal Multiple-Octet Coded Character Set (UCS) - Part 1: Architecture and Basic Multilingual Plane (May 1993) with amendments Google Scholar
  12. 12.
    Yergeau, F.: UTF-8, a transformation format of ISO 10646. RFC-2279 (January 1998)Google Scholar
  13. 13.
    AIPA: CIRCOLARE 19 giugno 2000 n. AIPA/CR/24. Italian MIT Website (2000),
  14. 14.
    Malpani, A., Housley, R., Freeman, T.: Simple Certificate Validation Protocol (SCVP). IETF Draft, PKIX Working Group (October 2003)Google Scholar
  15. 15.
    Adams, C., Sylvester, P., Zolotarev, M., Zuccherato, R.: Data Validation and Certification Server Protocols. RFC-3039 (February 2001)Google Scholar
  16. 16.
    Weider, C., Preston, C., Simonsen, K., Alvestrand, H., Atkinson, R., Crispin, M., Svanberg, P.: The Report of the IAB Character Set Workshop held February 29 - March 1, 1996. RFC-2130 (April 1997)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Antonio Lioy
    • 1
  • Marius Marian
    • 1
  • Natalia Moltchanova
    • 1
  • Massimiliano Pala
    • 1
  1. 1.Dip. di Automatica e InformaticaPolitecnico di TorinoTorinoItaly

Personalised recommendations