{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:36:32Z","timestamp":1750307792462,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,3,4]],"date-time":"2008-03-04T00:00:00Z","timestamp":1204588800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,3,4]]},"DOI":"10.1145\/1373290.1373301","type":"proceedings-article","created":{"date-parts":[[2008,5,28]],"date-time":"2008-05-28T16:50:20Z","timestamp":1211993420000},"page":"72-88","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Public key superstructure \"it's PKI Jim, but not as we know it!\""],"prefix":"10.1145","author":[{"given":"Stephen","family":"Wilson","sequence":"first","affiliation":[{"name":"Lockstep Consulting Pty Limited, NSW, Australia"}]}],"member":"320","published-online":{"date-parts":[[2008,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"APEC Telecommunications Working Group -- E-Authentication Task Group Achieving PKI Interoperability (1999).  APEC Telecommunications Working Group -- E-Authentication Task Group Achieving PKI Interoperability (1999)."},{"key":"e_1_3_2_1_2_1","first-page":"7690","volume":"981","author":"APEC Telecommunications Working Group","year":"2002","journal-title":"Selection and Use ISBN"},{"key":"e_1_3_2_1_3_1","unstructured":"Australian Department of Health and Ageing Electronic Signatures for Prescribing and Dispensing eHealth Branch (2006) http:\/\/www.msia.com.au\/esig_prescript_document.pdf (accessed 31 Jan 2008).  Australian Department of Health and Ageing Electronic Signatures for Prescribing and Dispensing eHealth Branch (2006) http:\/\/www.msia.com.au\/esig_prescript_document.pdf (accessed 31 Jan 2008)."},{"key":"e_1_3_2_1_4_1","unstructured":"Australian Government Information Management Office (AGIMO) Gatekeeper PKI Framework Cross Recognition Policy Department of Finance and Deregulation (2008) http:\/\/www.gatekeeper.gov.au\/__data\/assets\/file\/0004\/52276\/Cross_Recognition_Policy.rtf (accessed 8 Jan 2008).  Australian Government Information Management Office (AGIMO) Gatekeeper PKI Framework Cross Recognition Policy Department of Finance and Deregulation (2008) http:\/\/www.gatekeeper.gov.au\/__data\/assets\/file\/0004\/52276\/Cross_Recognition_Policy.rtf (accessed 8 Jan 2008)."},{"key":"e_1_3_2_1_5_1","unstructured":"Australian Government Information Management Office (AGIMO) Relationship Certificate Guidebook Department of Finance and Administration (2006) http:\/\/www.agimo.gov.au\/__data\/assets\/pdf_file\/0016\/52252\/Relationship_Guidebook.pdf (accessed 19 Nov 2007).  Australian Government Information Management Office (AGIMO) Relationship Certificate Guidebook Department of Finance and Administration (2006) http:\/\/www.agimo.gov.au\/__data\/assets\/pdf_file\/0016\/52252\/Relationship_Guidebook.pdf (accessed 19 Nov 2007)."},{"key":"e_1_3_2_1_6_1","unstructured":"Barnes R. &amp; Kent S. An Infrastructure to Support Secure Internet Routing IETF Secure Inter-Domain Routing Working Group (2007) http:\/\/tools.ietf.org\/id\/draft-ietf-sidr-arch-00.txt (accessed 31 Jan 2008).  Barnes R. &amp; Kent S. An Infrastructure to Support Secure Internet Routing IETF Secure Inter-Domain Routing Working Group (2007) http:\/\/tools.ietf.org\/id\/draft-ietf-sidr-arch-00.txt (accessed 31 Jan 2008)."},{"volume-title":"Australia","year":"2004","author":"Barnett S.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","unstructured":"Brewer J. &amp; Wilson S. Smartcards and PKI at Medicare Australia Australian Electrical &amp; Electronic Manufacturers Association ICT Forums (2006) http:\/\/www.aeema.asn.au\/ArticleDocuments\/41\/Smartcards%20and%20PKI%20at%20Medicare%20Australia%20-%2014Feb06.pdf (accessed 31 Jan 2008).  Brewer J. &amp; Wilson S. Smartcards and PKI at Medicare Australia Australian Electrical &amp; Electronic Manufacturers Association ICT Forums (2006) http:\/\/www.aeema.asn.au\/ArticleDocuments\/41\/Smartcards%20and%20PKI%20at%20Medicare%20Australia%20-%2014Feb06.pdf (accessed 31 Jan 2008)."},{"key":"e_1_3_2_1_9_1","unstructured":"Burr W. Electronic Authentication in the U.S. Federal Government Asia PKI Forum Tokyo (2005) http:\/\/www.asia-pkiforum.org\/feb_tokyo\/NIST_Burr.pdf (accessed 23 Nov 2007).  Burr W. Electronic Authentication in the U.S. Federal Government Asia PKI Forum Tokyo (2005) http:\/\/www.asia-pkiforum.org\/feb_tokyo\/NIST_Burr.pdf (accessed 23 Nov 2007)."},{"key":"e_1_3_2_1_10_1","unstructured":"Cameron C. The Laws of Identity Microsoft Corporation (2005) http:\/\/www.identityblog.com\/stories\/2005\/05\/13\/TheLawsOfIdentity.pdf (accessed 31 Jan 2008).  Cameron C. The Laws of Identity Microsoft Corporation (2005) http:\/\/www.identityblog.com\/stories\/2005\/05\/13\/TheLawsOfIdentity.pdf (accessed 31 Jan 2008)."},{"key":"e_1_3_2_1_11_1","unstructured":"Common Criteria Arrangement on the Recognition of Common Criteria Certificates in the field of Information Technology Security (2000) http:\/\/www.commoncriteriaportal.org\/public\/files\/cc-recarrange.pdf.  Common Criteria Arrangement on the Recognition of Common Criteria Certificates in the field of Information Technology Security (2000) http:\/\/www.commoncriteriaportal.org\/public\/files\/cc-recarrange.pdf."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Ellison C. Frantz B. Lampson B. Rivest R. Thomas B. &amp; Ylnen T. SPKI Certificate Theory RFC 2693 IETF SPKI Working Group (1999) ftp:\/\/ftp.isi.edu\/in-notes\/rfc2693.txt (accessed 31 Jan 2008).   Ellison C. Frantz B. Lampson B. Rivest R. Thomas B. &amp; Ylnen T. SPKI Certificate Theory RFC 2693 IETF SPKI Working Group (1999) ftp:\/\/ftp.isi.edu\/in-notes\/rfc2693.txt (accessed 31 Jan 2008).","DOI":"10.17487\/rfc2693"},{"key":"e_1_3_2_1_13_1","first-page":"1","volume":"16","author":"Ellison C.","year":"2000","journal-title":"Public Key Infrastructure Computer Security Journal"},{"volume-title":"Xplor Document Management Conference","year":"2002","author":"Forey M.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","unstructured":"Freeman R. Trust Services -- A Market Appraisal Mack Interact (2002)http:\/\/www.tscheme.org\/library\/tSi0156_01%20TSP%20market%20status%20report.pdf (accessed 19 Nov 2007).  Freeman R. Trust Services -- A Market Appraisal Mack Interact (2002)http:\/\/www.tscheme.org\/library\/tSi0156_01%20TSP%20market%20status%20report.pdf (accessed 19 Nov 2007)."},{"key":"e_1_3_2_1_16_1","unstructured":"International Organization for Standardization General requirements for the competence of testing and calibration laboratories ISO\/IEC 17025: 1999.  International Organization for Standardization General requirements for the competence of testing and calibration laboratories ISO\/IEC 17025:1999."},{"volume-title":"AusCERT Security Conference 2005","year":"2005","author":"J\u00f8sang A.","key":"e_1_3_2_1_17_1"},{"volume-title":"Trends and the Future Taipei International PKI Conference (Taipei","year":"2005","author":"Kent K.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"National Office for the Information Economy Liability and Other Legal Issues in the use of PKI Digital Certificates Australian Department of Communications Information Technology and the Arts (2000).  National Office for the Information Economy Liability and Other Legal Issues in the use of PKI Digital Certificates Australian Department of Communications Information Technology and the Arts (2000).","DOI":"10.18356\/78a81b6b-en"},{"volume-title":"16th Payment Systems International Conference (Belgium","year":"2000","author":"Smith P.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","unstructured":"Sneddon M. Legal Liability and e-transactions Australian Department of Communications Information Technology and the Arts (2000). http:\/\/www.egov.vic.gov.au\/pdfs\/publication_utz1508.pdf (accessed 23 Nov 2007).  Sneddon M. Legal Liability and e-transactions Australian Department of Communications Information Technology and the Arts (2000). http:\/\/www.egov.vic.gov.au\/pdfs\/publication_utz1508.pdf (accessed 23 Nov 2007)."},{"key":"e_1_3_2_1_23_1","first-page":"75","author":"Standards Australia","year":"1996","journal-title":"Miscellaneous Publication MP"},{"key":"e_1_3_2_1_24_1","unstructured":"Victorian Office of the Chief Information Officer Land Exchange (LX) Case Study Government of Victoria (2004) http:\/\/www.egov.vic.gov.au\/pdfs\/Land%20Exchange-shh-30April-v1.0-CIO.pdf (accessed 21 Nov 2007).  Victorian Office of the Chief Information Officer Land Exchange (LX) Case Study Government of Victoria (2004) http:\/\/www.egov.vic.gov.au\/pdfs\/Land%20Exchange-shh-30April-v1.0-CIO.pdf (accessed 21 Nov 2007)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/647032.759933"},{"key":"e_1_3_2_1_26_1","unstructured":"Wilson S. Leveraging external accreditation to achieve PKI cross-recognition Australian Attorney General's Privacy and Security in the Information Age Conference (Melbourne Australia 16--17 Aug 2001) http:\/\/www.ag.gov.au\/www\/agd\/agd.nsf\/Page\/Privacy_PrivacyandSecurityintheInformationAgeConferencePapers (accessed 31 Jan 2008).  Wilson S. Leveraging external accreditation to achieve PKI cross-recognition Australian Attorney General's Privacy and Security in the Information Age Conference (Melbourne Australia 16--17 Aug 2001) http:\/\/www.ag.gov.au\/www\/agd\/agd.nsf\/Page\/Privacy_PrivacyandSecurityintheInformationAgeConferencePapers (accessed 31 Jan 2008)."},{"key":"e_1_3_2_1_27_1","unstructured":"Wilson S. Guidelines on how to determine Return on Investment in PKI OASIS PKI Education Sub-committee V 1.4 (2005) http:\/\/idtrust.xml.org\/guidelines-how-determine-return-investment-pki (accessed 14 Jan 2008).  Wilson S. Guidelines on how to determine Return on Investment in PKI OASIS PKI Education Sub-committee V 1.4 (2005) http:\/\/idtrust.xml.org\/guidelines-how-determine-return-investment-pki (accessed 14 Jan 2008)."},{"key":"e_1_3_2_1_28_1","first-page":"353","author":"Winn J. K.","year":"2001","journal-title":"Idaho L. Rev."}],"event":{"name":"IDtrust 2008: 7th Symposium on Identity and Trust on the Internet","sponsor":["Internet2","The National Institute of Standards and Technology","OASIS IDtrust Member Section","FPKIPA Federal Public Key Infrastructure Policy Authority"],"location":"Gaithersburg Maryland USA","acronym":"IDtrust 2008"},"container-title":["Proceedings of the 7th symposium on Identity and trust on the Internet"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1373290.1373301","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1373290.1373301","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:21Z","timestamp":1750254981000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1373290.1373301"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3,4]]},"references-count":27,"alternative-id":["10.1145\/1373290.1373301","10.1145\/1373290"],"URL":"https:\/\/doi.org\/10.1145\/1373290.1373301","relation":{},"subject":[],"published":{"date-parts":[[2008,3,4]]},"assertion":[{"value":"2008-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}