Introduction
Public-key infrastructure (PKI) manages trust in electronic transactions. The principal elements used for maintaining that trust are the contents of the certificates and the security safeguards in effect in the environments of the various parties involved. These two elements are derived by a risk management procedure from the business purpose of the exchanges, as captured in the certificate policy.
Before discussing trust management in PKI, a definition of the word “trust” is required.
Reference [1] defines trust in the following way: “Generally, an entity can be said to “trust” a second entity when it (the first entity) makes the assumption that the second entity will behave exactly as the first entity expects.”
The first entity makes this assumption about a relevant area of the second entity's behaviour, and so the trust between them is limited to that specific area. In PKI the behaviour of interest is related to the distribution and use of public keys for electronic...
References
ITU-T Recommendation X.509 (2000 E). “Information Technology.” Open systems interconnection—The Directory: Public-key and attribute certificate frameworks.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this entry
Cite this entry
Boeyen, S. (2005). Trust Models. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_440
Download citation
DOI: https://doi.org/10.1007/0-387-23483-7_440
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-23473-1
Online ISBN: 978-0-387-23483-0
eBook Packages: Computer ScienceReference Module Computer Science and Engineering