E-Book, Englisch, 448 Seiten
Vacca Public Key Infrastructure
1. Auflage 2004
ISBN: 978-1-135-51703-8
Verlag: Taylor & Francis
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Building Trusted Applications and Web Services
E-Book, Englisch, 448 Seiten
ISBN: 978-1-135-51703-8
Verlag: Taylor & Francis
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape. Although these technologies have been around for over twenty years, this legislative move will surely boost e-commerce activity. Secure electronic business transactions, such as contracts, legal documents, insurance, and bank loans are now legally recognized. In order to adjust to the realities of the marketplace, other services may be needed, such as a non-repudiation service, digital notary, or digital time-stamping service. The collection of these components, known as Public Key Infrastructure (PKI), is paving the way for secure communications within organizations and on the public Internet.
Zielgruppe
Programmers and technical staff implementing PKI; IT and department managers; and engineers and programmers developing PKI products
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
OVERVIEW OF PKI TECHNOLOGY
Public Key Infrastructures (PKIs): What Are They?
Type of Certificate Authorities (CAS) Services
PKI Standards
Types of Vendor and Third-Party CA Systems
Protecting Private Keys
CA System Attacks
Stolen Private Keys: What Can Be Done?
Certificate Practice Statements
PKI Readiness
ANALYZING AND DESIGNING PUBLIC KEY INFRASTRUCTURES
PKI Design Issues
Cost Justification and Consideration
PKI Standards Design Issues
PKI Architectural Design Considerations
IMPLEMENTING PKI
Requirements
Implementation Schedule
Implementation Costs
PKI Performance
MANAGING PKI
Requesting a Certificate
Obtaining a Certificate
Storing a Certificate within the Browser
Using a Certificate
Revoking a Certificate
Summary, Conclusions, and Recommendations
APPENDICES
GLOSSARY