July 1, 2003
Author(s)
William T. Polk, Nelson E. Hastings, A Malpani
This article describes the features of different PKI architectures, and the motivations behind their use. While some PKI architectures (e.g., hierarchies) are very simple, political and social realities encourage deployment of more complex (e.g., mesh)