[1] Tarah A, Huitema C. Associating metrics to certification paths. In Computer Security. Springer-Verlag, 1992.175~189
[2] Beth T, Borcherding M, Klein B. Valuation of trust in open networks. In: Proceedings of the Conference on Computer Security. New York, Springer-Verlag, 1994.3~18
[3] Mended S, Huitema C. A new approach to the X 509 framework: Allowing a global authentication infrastructure without a global trust model; In: Proceedings of the Internet Society Symposium on Network and Distributed System Security. 1995
[4] Maurer U. Modeling a public-key infrastructure. In: Proceedings of the Conference on Computer Security, Lecture Notes in Computer Science,Berlin:Springer-Verlag,1996,1146:325~350
[5] Wreiter MK, Stubblebine SG. Resilient authentication using path independence. IEEE Transaction on Computers, 1998,47:1351~1362
[6] Howell J, Kotz D. A formal semantics for SPKI. In: Proceedings of the Sixth European Symposium on Research in Computer Security (ESORICS 2000). Lecture Notes in Computer Science, Springer-Verlag, 2000,1895:140~158
[7] Reiter MK, Stubblebine SG. Authentication metric analysis and design. ACM Transaction on Information and System Security, 1999,2(2):138~158
[8] Kohlas R, Maurer U. Reasoning about Public-Key certification: on binding between entities and Public Keys. Lecture Notes in Computer Science, Berlin:Springer-Verlag,1999,1648:86~103
[9] Marchesini J, Smith S. Modeling Public Key Infrastructures in the real world. In: Proceeding of EuroPKI 2005. Lecture Notes in Computer Science, Springer-Verlag, 2005,3545:118~134
[10] Liu HL, Zhang QSH, Wu JP. A conditional predicate calculus logic for PKI trust model analysis. Journal of China Institute of Communications, 2002,23(11):14~20 (in Chinese) 刘海龙,张其善,吴今培. PKI信任模型的条件谓词逻辑推理.通信学报,2002,23(11):14~20
[11] Bakkali EL, Kaitouni BI. A predicate calculus logic for the PKI trust model analysis. In: IEEE International Symposium on Network Computing and Applications. 2001.368~371
[12] Bakkali EL, Kaitouni BI. A logic-based reasoning about PKI trust model. In:Sixth IEEE Symposium on Computer and Communications. 2001. 42~48
[13] Bicakci K, Crispo B, Tanenbaum SA. How to incorporate revocation status information into the trust metrics for public-key certification. In:Proceedings of 2005 ACM Symposium on Applied Computing. 2005. 1594~1598
[14] Li NH, Feigenbaum J. Nonmonotonicity, user interfaces, and risk assessment in certificate revocation. Lecture Notes in Computer Science, Springer-Verlag, 2002,2339: 166~177
[15] Levien R, Aiken A. Attack-resistant trust metrics for public key certification. In:Proceedings of the 7th Conference on USENIX Security Symposium. 1998. 7: 18
|