Design and implementation of an efficient method for certificate path verification in hierarchical public key infrastructures

Balachandra*, K. V. Prema

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In order to challenge the security threats for e-commerce and e-business transactions, robust and trustworthy security systems are required. Public Key Infrastructure (PKI) is a frame work on which the security services are established. Most of the business corporations deploy Hierarchical PKI as their security infrastructure, in which, certificate path is unidirectional, so certificate path development and validation is simple and straight forward. In this paper, we propose a novel method for certificate path verification in Hierarchical Public Key Infrastructures and compare the experimental results with the existing certificate Path verification methods.

Original languageEnglish
Title of host publicationInformation Processing and Management
Subtitle of host publicationInternational Conference on Recent Trends in Business Administration and Information Processing, BAIP 2010, Trivandrum, Kerala, India, March 26-27, 2010. Proceed
PublisherSpringer Verlag
Pages320-324
Number of pages5
Volume70
ISBN (Print)9783642122132
DOIs
Publication statusPublished - 2010

Publication series

NameCommunications in Computer and Information Science
Volume70
ISSN (Print)1865-0929

All Science Journal Classification (ASJC) codes

  • General Computer Science

Fingerprint

Dive into the research topics of 'Design and implementation of an efficient method for certificate path verification in hierarchical public key infrastructures'. Together they form a unique fingerprint.

Cite this