{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:01:13Z","timestamp":1754157673289,"version":"3.41.2"},"reference-count":0,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[1998,12,1]],"date-time":"1998-12-01T00:00:00Z","timestamp":912470400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998,12,1]]},"abstract":"<jats:p>The \u201cweb of trust\u201d is one approach to the problem of trusted exchange of public keys in a public key security system. In a web of trust, individuals accept the bulk of the responsibility for identifying and authenticating each other and subsequently swapping their keys. This trust model is supported by some commercial products and some industry standards. The main alternative is the Public Key Infrastructure (PKI) where key holders are identified and authenticated by third\u2010party Certification Authorities (CAs). Rather than personally swapping keys, participants in a PKI obtain one another\u2019s public keys from one or more CAs in the form of digital certificates. These two trust models have, for some time, been vying for selection internationally in both policy and commercial forums. In Australia, the debate has been spurred on by recent deliberations over the possible form of a national peak authentication body, and by spirited discussion of the privacy impacts of a national hierarchy. There appears to be a view emerging that a web of trust might be easier to constitute than a hierarchy and that it may be inherently less intrusive. On closer inspection, however, these promises prove to be unfounded. This paper discusses certain limitations of any web of trust model, with particular reference to scalability, uniform standards of identification, auditability, and the protection of personal identification data.<\/jats:p>","DOI":"10.1108\/09685229810240130","type":"journal-article","created":{"date-parts":[[2004,5,11]],"date-time":"2004-05-11T21:50:49Z","timestamp":1084312249000},"page":"218-220","source":"Crossref","is-referenced-by-count":3,"title":["Some limitations of web of trust models"],"prefix":"10.1108","volume":"6","author":[{"given":"Stephen","family":"Wilson","sequence":"first","affiliation":[]}],"member":"140","container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685229810240130","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229810240130\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229810240130\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:09:49Z","timestamp":1753402189000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/6\/5\/218-220\/185797"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,12,1]]},"references-count":0,"journal-issue":{"issue":"5","published-print":{"date-parts":[[1998,12,1]]}},"alternative-id":["10.1108\/09685229810240130"],"URL":"https:\/\/doi.org\/10.1108\/09685229810240130","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[1998,12,1]]}}}