Eyas Al-Hajery. Trust model in PGP and X.509 standard PKI. 2001(2004-05-01).
[5]
刘海龙, 张其善. PKI 的互操作与信任模型[J]. 计算机工程与应用, 2003, 24(3): 48-51. Liu Hailong, Zhang Qishan. PKI cross-operation and trust model[J]. Computer Engineering and Application, 2003, 24(3): 48-51.
[6]
Jim Turnbull. Cross-certification and PKI policy networking august. 2000(2005-04-01).
[7]
王晓峰, 王尚平. 公钥基础设施中的证书路径构造方法及验证算法[J]. 计算机工程与应用, 2002, 12(1): 51-56. Wang Xiaofeng, Wang Shangping. PKI certification path construction method and verification algorithm[J]. Computer Engineering and Application, 2002, 12(1): 51-56.
[8]
Lloyd S. Understanding certification path construction. 2002(2004-09-09).
[9]
Jun Xu, Mukesh Singhal. A. Certificate path generation algorithm for authenticated signaling in ATM networks[J]. The Ohio State University, 1997,10(2):98-109.
[10]
Pinkas D, Housley R. Delegated path validation and delegated path discovery protocol requirements[Z]. Internet Draft(Work in progress), 2002.