An efficient method to merge hierarchical public key infrastructures

Balachandra Muniyal, Prema K.Venkat Reddy

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

Security threats are most common in e-commerce and e-business transactions. Public key infrastructure (PKI) is a framework on which the security services are established. It can provide various secure services in e-commerce and e-business transactions by providing a comprehensive infrastructure for issuing and managing public keys in the form of digital certificates to a set of users. During acquisition of companies, the multiple PKIs deployed by them must be interoperated. Hierarchical PKI is one of the most popular PKI trust models that the companies deploy as their security infrastructure. Considering the specialties of such context, an efficient scheme to merge hierarchical PKIs during acquisition of companies is proposed. The proposed merging process is simple, fast and low cost. Compared with the common ways of merging PKIs with cross-certification at the root, the certificate verification in new PKI is more efficient and straightforward. Also the employment cost of root certification authorities is reduced. In the proposed method, there is no cross-certification at the root and so certificate verification time reduces significantly as compared to the normal method of merging with cross-certification.

Original languageEnglish
Pages (from-to)442-446
Number of pages5
JournalInternational Journal of Computers and Applications
Volume32
Issue number4
DOIs
Publication statusPublished - 2010

Fingerprint

Merging
Industry
Costs

All Science Journal Classification (ASJC) codes

  • Software
  • Hardware and Architecture
  • Computer Science Applications
  • Computer Graphics and Computer-Aided Design

Cite this

@article{de9e1793818646ba9e4d88d97dc93b6b,
title = "An efficient method to merge hierarchical public key infrastructures",
abstract = "Security threats are most common in e-commerce and e-business transactions. Public key infrastructure (PKI) is a framework on which the security services are established. It can provide various secure services in e-commerce and e-business transactions by providing a comprehensive infrastructure for issuing and managing public keys in the form of digital certificates to a set of users. During acquisition of companies, the multiple PKIs deployed by them must be interoperated. Hierarchical PKI is one of the most popular PKI trust models that the companies deploy as their security infrastructure. Considering the specialties of such context, an efficient scheme to merge hierarchical PKIs during acquisition of companies is proposed. The proposed merging process is simple, fast and low cost. Compared with the common ways of merging PKIs with cross-certification at the root, the certificate verification in new PKI is more efficient and straightforward. Also the employment cost of root certification authorities is reduced. In the proposed method, there is no cross-certification at the root and so certificate verification time reduces significantly as compared to the normal method of merging with cross-certification.",
author = "Balachandra Muniyal and Reddy, {Prema K.Venkat}",
year = "2010",
doi = "10.2316/Journal.202.2010.4.202-2855",
language = "English",
volume = "32",
pages = "442--446",
journal = "International Journal of Computers and Applications",
issn = "1206-212X",
publisher = "ACTA Press",
number = "4",

}

An efficient method to merge hierarchical public key infrastructures. / Muniyal, Balachandra; Reddy, Prema K.Venkat.

In: International Journal of Computers and Applications, Vol. 32, No. 4, 2010, p. 442-446.

Research output: Contribution to journalArticle

TY - JOUR

T1 - An efficient method to merge hierarchical public key infrastructures

AU - Muniyal, Balachandra

AU - Reddy, Prema K.Venkat

PY - 2010

Y1 - 2010

N2 - Security threats are most common in e-commerce and e-business transactions. Public key infrastructure (PKI) is a framework on which the security services are established. It can provide various secure services in e-commerce and e-business transactions by providing a comprehensive infrastructure for issuing and managing public keys in the form of digital certificates to a set of users. During acquisition of companies, the multiple PKIs deployed by them must be interoperated. Hierarchical PKI is one of the most popular PKI trust models that the companies deploy as their security infrastructure. Considering the specialties of such context, an efficient scheme to merge hierarchical PKIs during acquisition of companies is proposed. The proposed merging process is simple, fast and low cost. Compared with the common ways of merging PKIs with cross-certification at the root, the certificate verification in new PKI is more efficient and straightforward. Also the employment cost of root certification authorities is reduced. In the proposed method, there is no cross-certification at the root and so certificate verification time reduces significantly as compared to the normal method of merging with cross-certification.

AB - Security threats are most common in e-commerce and e-business transactions. Public key infrastructure (PKI) is a framework on which the security services are established. It can provide various secure services in e-commerce and e-business transactions by providing a comprehensive infrastructure for issuing and managing public keys in the form of digital certificates to a set of users. During acquisition of companies, the multiple PKIs deployed by them must be interoperated. Hierarchical PKI is one of the most popular PKI trust models that the companies deploy as their security infrastructure. Considering the specialties of such context, an efficient scheme to merge hierarchical PKIs during acquisition of companies is proposed. The proposed merging process is simple, fast and low cost. Compared with the common ways of merging PKIs with cross-certification at the root, the certificate verification in new PKI is more efficient and straightforward. Also the employment cost of root certification authorities is reduced. In the proposed method, there is no cross-certification at the root and so certificate verification time reduces significantly as compared to the normal method of merging with cross-certification.

UR - http://www.scopus.com/inward/record.url?scp=79951978563&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=79951978563&partnerID=8YFLogxK

U2 - 10.2316/Journal.202.2010.4.202-2855

DO - 10.2316/Journal.202.2010.4.202-2855

M3 - Article

VL - 32

SP - 442

EP - 446

JO - International Journal of Computers and Applications

JF - International Journal of Computers and Applications

SN - 1206-212X

IS - 4

ER -