An Examination of Asserted PKI Issues and Pro- posed Alternatives

[1]  Stefan A. Brands,et al.  Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy , 2000 .

[2]  Roger Clarke,et al.  The Fundamental Inadequacies of Conventional Public Key Infrastructure , 2001, ECIS.

[3]  Russ Housley,et al.  Delegated Path Validation and Delegated Path Discovery Protocol Requirements , 2001, RFC.

[4]  Donald E. Eastlake,et al.  Domain Name System Security Extensions , 1997, RFC.

[5]  Stephen Farrell,et al.  Internet X.509 Public Key Infrastructure Certificate Management Protocols , 1999, RFC.

[6]  Ronald L. Rivest,et al.  SDSI - A Simple Distributed Security Infrastructure , 1996 .

[7]  M. Ufuk Çaglayan,et al.  An efficient, dynamic and trust preserving public key infrastructure , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[8]  Stephen Dohrmann,et al.  Public-key Support for Collaborative Groups , 2002 .

[9]  Tim Dean,et al.  Domain Security Services using S/MIME , 2001, RFC.

[10]  Russ Housley,et al.  An Internet Attribute Certificate Profile for Authorization , 2002, RFC.

[11]  Craig Gentry,et al.  Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.

[12]  S. Micali,et al.  NOVOMODO : Scalable Certificate Validation and Simplified PKI Management , 2002 .

[13]  Jon Callas,et al.  OpenPGP Message Format , 1998, RFC.

[14]  Steve Hanna,et al.  Building Certifications Paths: Forward vs. Reverse , 2001, NDSS.

[15]  Morrie Gasser,et al.  An architecture for practical delegation in a distributed system , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[16]  Peter Gutmann,et al.  PKI: It's Not Dead, Just Resting , 2002, Computer.

[17]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[18]  Jeff Hodges,et al.  Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V2. 0 , 2001 .

[19]  Canada,et al.  Extended Validation Models in PKI : Alternatives and Implications , 2002 .

[20]  Moni Naor,et al.  Certificate revocation and certificate update , 1998, IEEE Journal on Selected Areas in Communications.

[21]  Joan Feigenbaum,et al.  The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.