@techreport{ymbk-ta-publication-00, number = {draft-ymbk-ta-publication-00}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-ymbk-ta-publication/00/}, author = {Steven Bellovin and Randy Bush and Russ Housley and Stephen Kent and Sean Turner}, title = {{Trust Anchor Publication Advice}}, pagetotal = 9, year = 2012, month = aug, day = 16, abstract = {Many Internet protocols and services rely on credentials which use asymmetric keys. Many of these are hierarchic structures having certification authorities (CAs) that act as trust anchors (TAs). There is little general guidance on procedures for how these trust anchors can be distributed or otherwise published with prudence. To quote a well known security expert, "It's a matter of oral tradition in security circles." This document attempts to capture some of that lore.}, }