{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:01:16Z","timestamp":1754157676155,"version":"3.41.2"},"reference-count":0,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[1999,5,1]],"date-time":"1999-05-01T00:00:00Z","timestamp":925516800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999,5,1]]},"abstract":"<jats:p>Many products and enterprise solutions are becoming available to ensure seamless, secured electronic transactions, all of which must find common trust. This paper reviews the models along a continuum with the low\u2010assurance self\u2010signing certificate authority (CA) at one end, and the high\u2010assurance PKI hierarchical CA at the other. The evolution of technologies and market readiness along the continuum is discussed. The authors expand on earlier discussions of technology and geopolitical solutions and suggest mechanisms, principally the adoption of international standards and protocols, to establish universal trust across national boundaries.<\/jats:p>","DOI":"10.1108\/09685229910265547","type":"journal-article","created":{"date-parts":[[2002,7,27]],"date-time":"2002-07-27T02:08:10Z","timestamp":1027735690000},"page":"95-100","source":"Crossref","is-referenced-by-count":3,"title":["The evolution of certificate model architecture"],"prefix":"10.1108","volume":"7","author":[{"given":"Carrie","family":"Liddy","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alice","family":"Sturgeon","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"140","container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685229910265547","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229910265547\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229910265547\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:09:51Z","timestamp":1753402191000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/7\/2\/95-100\/184586"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,5,1]]},"references-count":0,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1999,5,1]]}},"alternative-id":["10.1108\/09685229910265547"],"URL":"https:\/\/doi.org\/10.1108\/09685229910265547","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[1999,5,1]]}}}