Balachandra Muniyal and Prema K. Venkat Reddy
[1] S. Adams & S. Farrell, Internet X.509 public key infrastructurecertificate management protocols, Network Working GroupRequest for Comments 2510, 1999, http://www.ietf.org/rfc/rfc2510.txt [2] J. Olnes, PKI interoperability by an independent, trustedvalidation authority Veritasveien 1, N-1322 Hvik, Norway:DNV Research), 2005. [3] A. Silva & M. Stanton, Pequi: A PKIX implementation for se-cure communication, http://www.isoc.org/inet99/proceedings [4] Z. Guo, T. Okuyama, & M.R. Finley, Jr., A new trust modelfor PKI interoperability, Proceedings of the Joint InternationalConference on Autonomic and Autonomous Systems and Inter-national Conference on Networking and Services (ICAS/ICNS2005), French Polynesia, 2005. [5] S. Koga & K. Sakurai, A merging method of certificationauthorities without using cross-certifications, Proceedings of theInternational Conference on Advanced Information Networkingand Application (AINA’04), Fukuoka, Japan, 2004. [6] H. Pan, Y.F. Zhu, Z.Y. Pan, & X.L. Lu, An efficient schemeof merging multiple public key infrastructures in ERP, LNCS(Berlin: Springer-Verlag, 2005), 919–924. [7] A. Bourka, D. Polemi, & D. Koutsouris, Interoperabilityamong healthcare organizations acting as certification author-ities, IEEE Transactions on Information Technology in Bio-Medicine, 7(4), 2003, 364–377. [8] C. Satizbal, R. Pez, & J. Forn, Building a virtual hierarchy formanaging trust relationships in a hybrid architecture, Journalof Computers, 1(7), 2006, 60–68. [9] C. Satizbal, J. Hernndez-Serranoa, J. Forna, & J. Peguerolesa,Building a virtual hierarchy to simplify certification path dis-covery in mobile ad-hoc networks, Computer Communications,30(7), 2007, 1498–1512. [10] C. Adams & S. Lloyd, Understanding public-key infrastructure:Concepts, standards, and deployment considerations, SecondEdition (Boston, MA: Addison Wesley, 2003). [11] S. Lloyd, D. Fillingham, & R. Lampard, CA-CA interoperabil-ity, PKI Forum, 2001, http://www.pkiforum.org/pdfs/ca-cainterop.pdf. [12] A. Saxena, Public key infrastructure concepts, design anddeployment (New Delhi: TMH, 2004). [13] M. Cooper, Y. Dzambasow, & P. Hesse, Internet X.509 pub-lic key infrastructure: Certification path building, Networkworking group, RFC 4158, September, 2005. [14] S. Chokhani, W. Ford, & R. Sabett, Internet X.509 publickey infrastructure certificate policy and certification practicesframework, Network working group, RFC 3647, November,2003. [15] J. Linn, Trust models and management in public-key infras-tructures, (Bedford, USA: RSA Laboratories, 2000).
Important Links:
Go Back