Computer Security, p
How to incorporate revocation status information into the trust metrics for public-key certification
Authentication metric analysis and design