This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Public Key Infrastructures that Satisfy Security Goals
July/August 2003 (vol. 7 no. 4)
pp. 60-67
William T. Polk, National Institute of Standards and Technology, US Department of Commerce
Nelson E. Hastings, National Institute of Standards and Technology, US Department of Commerce
Ambarish Malpani, Caymas Systems

The architecture chosen for a public key infrastructure (PKI) determines the scalability and usability experienced by PKI users. Enterprise PKIs typically consist of a single certificate authority (CA) or small hierarchy of CAs along with a single directory system. These enterprise architectures have limited scalability, but simplify PKI client implementations. As enterprises seek to link their PKIs to support security services across organizational boundaries, networks of CAs and PKIs, based on the bridge CA concept, are emerging. A new PKI component, the validation authority, has been introduced to simplify the interface to today?s complex PKIs. This article provides a guide to PKI architecture that satisfies an organization?s security goals.

Citation:
William T. Polk, Nelson E. Hastings, Ambarish Malpani, "Public Key Infrastructures that Satisfy Security Goals," IEEE Internet Computing, vol. 7, no. 4, pp. 60-67, July-Aug. 2003, doi:10.1109/MIC.2003.1215661
Usage of this product signifies your acceptance of the Terms of Use.