Balachandra Muniyal and Prema K. Venkat Reddy


  1. [1] S. Adams & S. Farrell, Internet X.509 public key infrastructurecertificate management protocols, Network Working GroupRequest for Comments 2510, 1999,
  2. [2] J. Olnes, PKI interoperability by an independent, trustedvalidation authority Veritasveien 1, N-1322 Hvik, Norway:DNV Research), 2005.
  3. [3] A. Silva & M. Stanton, Pequi: A PKIX implementation for se-cure communication,
  4. [4] Z. Guo, T. Okuyama, & M.R. Finley, Jr., A new trust modelfor PKI interoperability, Proceedings of the Joint InternationalConference on Autonomic and Autonomous Systems and Inter-national Conference on Networking and Services (ICAS/ICNS2005), French Polynesia, 2005.
  5. [5] S. Koga & K. Sakurai, A merging method of certificationauthorities without using cross-certifications, Proceedings of theInternational Conference on Advanced Information Networkingand Application (AINA’04), Fukuoka, Japan, 2004.
  6. [6] H. Pan, Y.F. Zhu, Z.Y. Pan, & X.L. Lu, An efficient schemeof merging multiple public key infrastructures in ERP, LNCS(Berlin: Springer-Verlag, 2005), 919–924.
  7. [7] A. Bourka, D. Polemi, & D. Koutsouris, Interoperabilityamong healthcare organizations acting as certification author-ities, IEEE Transactions on Information Technology in Bio-Medicine, 7(4), 2003, 364–377.
  8. [8] C. Satizbal, R. Pez, & J. Forn, Building a virtual hierarchy formanaging trust relationships in a hybrid architecture, Journalof Computers, 1(7), 2006, 60–68.
  9. [9] C. Satizbal, J. Hernndez-Serranoa, J. Forna, & J. Peguerolesa,Building a virtual hierarchy to simplify certification path dis-covery in mobile ad-hoc networks, Computer Communications,30(7), 2007, 1498–1512.
  10. [10] C. Adams & S. Lloyd, Understanding public-key infrastructure:Concepts, standards, and deployment considerations, SecondEdition (Boston, MA: Addison Wesley, 2003).
  11. [11] S. Lloyd, D. Fillingham, & R. Lampard, CA-CA interoperabil-ity, PKI Forum, 2001,
  12. [12] A. Saxena, Public key infrastructure concepts, design anddeployment (New Delhi: TMH, 2004).
  13. [13] M. Cooper, Y. Dzambasow, & P. Hesse, Internet X.509 pub-lic key infrastructure: Certification path building, Networkworking group, RFC 4158, September, 2005.
  14. [14] S. Chokhani, W. Ford, & R. Sabett, Internet X.509 publickey infrastructure certificate policy and certification practicesframework, Network working group, RFC 3647, November,2003.
  15. [15] J. Linn, Trust models and management in public-key infras-tructures, (Bedford, USA: RSA Laboratories, 2000).

Important Links:

Go Back