Abstract
Security threats are most common in e-commerce and e-business transactions. Public key infrastructure (PKI) is a framework on which the security services are established. It can provide various secure services in e-commerce and e-business transactions by providing a comprehensive infrastructure for issuing and managing public keys in the form of digital certificates to a set of users. During acquisition of companies, the multiple PKIs deployed by them must be interoperated. Hierarchical PKI is one of the most popular PKI trust models that the companies deploy as their security infrastructure. Considering the specialties of such context, an efficient scheme to merge hierarchical PKIs during acquisition of companies is proposed. The proposed merging process is simple, fast and low cost. Compared with the common ways of merging PKIs with cross-certification at the root, the certificate verification in new PKI is more efficient and straightforward. Also the employment cost of root certification authorities is reduced. In the proposed method, there is no cross-certification at the root and so certificate verification time reduces significantly as compared to the normal method of merging with cross-certification.
Original language | English |
---|---|
Pages (from-to) | 442-446 |
Number of pages | 5 |
Journal | International Journal of Computers and Applications |
Volume | 32 |
Issue number | 4 |
DOIs | |
Publication status | Published - 2010 |
Fingerprint
All Science Journal Classification (ASJC) codes
- Software
- Hardware and Architecture
- Computer Science Applications
- Computer Graphics and Computer-Aided Design
Cite this
}
An efficient method to merge hierarchical public key infrastructures. / Muniyal, Balachandra; Reddy, Prema K.Venkat.
In: International Journal of Computers and Applications, Vol. 32, No. 4, 2010, p. 442-446.Research output: Contribution to journal › Article
TY - JOUR
T1 - An efficient method to merge hierarchical public key infrastructures
AU - Muniyal, Balachandra
AU - Reddy, Prema K.Venkat
PY - 2010
Y1 - 2010
N2 - Security threats are most common in e-commerce and e-business transactions. Public key infrastructure (PKI) is a framework on which the security services are established. It can provide various secure services in e-commerce and e-business transactions by providing a comprehensive infrastructure for issuing and managing public keys in the form of digital certificates to a set of users. During acquisition of companies, the multiple PKIs deployed by them must be interoperated. Hierarchical PKI is one of the most popular PKI trust models that the companies deploy as their security infrastructure. Considering the specialties of such context, an efficient scheme to merge hierarchical PKIs during acquisition of companies is proposed. The proposed merging process is simple, fast and low cost. Compared with the common ways of merging PKIs with cross-certification at the root, the certificate verification in new PKI is more efficient and straightforward. Also the employment cost of root certification authorities is reduced. In the proposed method, there is no cross-certification at the root and so certificate verification time reduces significantly as compared to the normal method of merging with cross-certification.
AB - Security threats are most common in e-commerce and e-business transactions. Public key infrastructure (PKI) is a framework on which the security services are established. It can provide various secure services in e-commerce and e-business transactions by providing a comprehensive infrastructure for issuing and managing public keys in the form of digital certificates to a set of users. During acquisition of companies, the multiple PKIs deployed by them must be interoperated. Hierarchical PKI is one of the most popular PKI trust models that the companies deploy as their security infrastructure. Considering the specialties of such context, an efficient scheme to merge hierarchical PKIs during acquisition of companies is proposed. The proposed merging process is simple, fast and low cost. Compared with the common ways of merging PKIs with cross-certification at the root, the certificate verification in new PKI is more efficient and straightforward. Also the employment cost of root certification authorities is reduced. In the proposed method, there is no cross-certification at the root and so certificate verification time reduces significantly as compared to the normal method of merging with cross-certification.
UR - http://www.scopus.com/inward/record.url?scp=79951978563&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79951978563&partnerID=8YFLogxK
U2 - 10.2316/Journal.202.2010.4.202-2855
DO - 10.2316/Journal.202.2010.4.202-2855
M3 - Article
AN - SCOPUS:79951978563
VL - 32
SP - 442
EP - 446
JO - International Journal of Computers and Applications
JF - International Journal of Computers and Applications
SN - 1206-212X
IS - 4
ER -