Design and implementation of an efficient method for certificate path verification in hierarchical public key infrastructures

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In order to challenge the security threats for e-commerce and e-business transactions, robust and trustworthy security systems are required. Public Key Infrastructure (PKI) is a frame work on which the security services are established. Most of the business corporations deploy Hierarchical PKI as their security infrastructure, in which, certificate path is unidirectional, so certificate path development and validation is simple and straight forward. In this paper, we propose a novel method for certificate path verification in Hierarchical Public Key Infrastructures and compare the experimental results with the existing certificate Path verification methods.

Original languageEnglish
Title of host publicationInformation Processing and Management
Subtitle of host publicationInternational Conference on Recent Trends in Business Administration and Information Processing, BAIP 2010, Trivandrum, Kerala, India, March 26-27, 2010. Proceed
Pages320-324
Number of pages5
Volume70
DOIs
Publication statusPublished - 2010

Publication series

NameCommunications in Computer and Information Science
Volume70
ISSN (Print)1865-0929

All Science Journal Classification (ASJC) codes

  • Computer Science(all)

Fingerprint Dive into the research topics of 'Design and implementation of an efficient method for certificate path verification in hierarchical public key infrastructures'. Together they form a unique fingerprint.

  • Cite this

    Balachandra, & Prema, K. V. (2010). Design and implementation of an efficient method for certificate path verification in hierarchical public key infrastructures. In Information Processing and Management: International Conference on Recent Trends in Business Administration and Information Processing, BAIP 2010, Trivandrum, Kerala, India, March 26-27, 2010. Proceed (Vol. 70, pp. 320-324). (Communications in Computer and Information Science; Vol. 70). https://doi.org/10.1007/978-3-642-12214-9-51