TY - GEN
T1 - Design and implementation of an efficient method for certificate path verification in hierarchical public key infrastructures
AU - Balachandra,
AU - Prema, K. V.
PY - 2010
Y1 - 2010
N2 - In order to challenge the security threats for e-commerce and e-business transactions, robust and trustworthy security systems are required. Public Key Infrastructure (PKI) is a frame work on which the security services are established. Most of the business corporations deploy Hierarchical PKI as their security infrastructure, in which, certificate path is unidirectional, so certificate path development and validation is simple and straight forward. In this paper, we propose a novel method for certificate path verification in Hierarchical Public Key Infrastructures and compare the experimental results with the existing certificate Path verification methods.
AB - In order to challenge the security threats for e-commerce and e-business transactions, robust and trustworthy security systems are required. Public Key Infrastructure (PKI) is a frame work on which the security services are established. Most of the business corporations deploy Hierarchical PKI as their security infrastructure, in which, certificate path is unidirectional, so certificate path development and validation is simple and straight forward. In this paper, we propose a novel method for certificate path verification in Hierarchical Public Key Infrastructures and compare the experimental results with the existing certificate Path verification methods.
UR - http://www.scopus.com/inward/record.url?scp=77950549045&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77950549045&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-12214-9-51
DO - 10.1007/978-3-642-12214-9-51
M3 - Conference contribution
AN - SCOPUS:77950549045
SN - 9783642122132
VL - 70
T3 - Communications in Computer and Information Science
SP - 320
EP - 324
BT - Information Processing and Management
PB - Springer Verlag
ER -