An anatomy of trust in public key infrastructure