To read this content please select one of the options below:

Some limitations of web of trust models

Stephen Wilson (Senior Manager, KMPG Certification Authority, Asia Pacific, Sydney, Australia)

Information Management & Computer Security

ISSN: 0968-5227

Article publication date: 1 December 1998

725

Abstract

The “web of trust” is one approach to the problem of trusted exchange of public keys in a public key security system. In a web of trust, individuals accept the bulk of the responsibility for identifying and authenticating each other and subsequently swapping their keys. This trust model is supported by some commercial products and some industry standards. The main alternative is the Public Key Infrastructure (PKI) where key holders are identified and authenticated by third‐party Certification Authorities (CAs). Rather than personally swapping keys, participants in a PKI obtain one another’s public keys from one or more CAs in the form of digital certificates. These two trust models have, for some time, been vying for selection internationally in both policy and commercial forums. In Australia, the debate has been spurred on by recent deliberations over the possible form of a national peak authentication body, and by spirited discussion of the privacy impacts of a national hierarchy. There appears to be a view emerging that a web of trust might be easier to constitute than a hierarchy and that it may be inherently less intrusive. On closer inspection, however, these promises prove to be unfounded. This paper discusses certain limitations of any web of trust model, with particular reference to scalability, uniform standards of identification, auditability, and the protection of personal identification data.

Keywords

Citation

Wilson, S. (1998), "Some limitations of web of trust models", Information Management & Computer Security, Vol. 6 No. 5, pp. 218-220. https://doi.org/10.1108/09685229810240130

Publisher

:

MCB UP Ltd

Copyright © 1998, MCB UP Limited

Related articles