{"title":"A predicate calculus logic for the PKI trust model analysis","authors":"H. Bakkali, Bahia Idrissi Kaitouni","doi":"10.1109/NCA.2001.962557","DOIUrl":null,"url":null,"abstract":"We propose a logic-based approach for reasoning about (public-key infrastructure) PKI trust models. Our formalism uses the predicate calculus language to describe a PKI trust model with greater precision than the widely used graph. It allows us to formalize the certificates and the statements about entities beliefs with regard to public key authenticity and certification authority's (CA's) trustworthiness. In this formalism, we take into account the number of CAs that have participated in an entity belief, the trust level in a statement and the policies constraints. By using this approach, we can verify the suitability of a model to applications with particular requirements.","PeriodicalId":385607,"journal":{"name":"Proceedings IEEE International Symposium on Network Computing and Applications. NCA 2001","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2001-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings IEEE International Symposium on Network Computing and Applications. NCA 2001","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCA.2001.962557","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
We propose a logic-based approach for reasoning about (public-key infrastructure) PKI trust models. Our formalism uses the predicate calculus language to describe a PKI trust model with greater precision than the widely used graph. It allows us to formalize the certificates and the statements about entities beliefs with regard to public key authenticity and certification authority's (CA's) trustworthiness. In this formalism, we take into account the number of CAs that have participated in an entity belief, the trust level in a statement and the policies constraints. By using this approach, we can verify the suitability of a model to applications with particular requirements.