Public Key Infrastructure: Building Trusted Applications and Web Services
With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape. Although these technologies have been around for over twenty years, this...
Đã lưu trong:
Tác giả chính: | |
---|---|
Định dạng: | Sách |
Ngôn ngữ: | English |
Được phát hành: |
CRC Press
2009
|
Truy cập trực tuyến: | http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1351 |
Các nhãn: |
Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
Thư viện lưu trữ: | Thư viện Trường Đại học Đà Lạt |
---|
id |
oai:scholar.dlu.edu.vn:DLU123456789-1351 |
---|---|
record_format |
dspace |
spelling |
oai:scholar.dlu.edu.vn:DLU123456789-13512009-11-27T09:06:11Z Public Key Infrastructure: Building Trusted Applications and Web Services R Vacca, John With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape. Although these technologies have been around for over twenty years, this legislative move will surely boost e-commerce activity. Secure electronic business transactions, such as contracts, legal documents, insurance, and bank loans are now legally recognized. In order to adjust to the realities of the marketplace, other services may be needed, such as a non-repudiation service, digital notary, or digital time-stamping service. The collection of these components, known as Public Key Infrastructure (PKI), is paving the way for secure communications within organizations and on the public Internet. OVERVIEW OF PKI TECHNOLOGY * Public Key Infrastructures (PKIs): What Are They? * Type of Certificate Authorities (CAS) Services * PKI Standards * Types of Vendor and Third-Party CA Systems * Protecting Private Keys * CA System Attacks * Stolen Private Keys: What Can Be Done? * Certificate Practice Statements * PKI Readiness ANALYZING AND DESIGNING PUBLIC KEY INFRASTRUCTURES * PKI Design Issues * Cost Justification and Consideration * PKI Standards Design Issues * PKI Architectural Design Considerations IMPLEMENTING PKI * Requirements * Implementation Schedule * Implementation Costs * PKI Performance MANAGING PKI * Requesting a Certificate * Obtaining a Certificate * Storing a Certificate within the Browser * Using a Certificate * Revoking a Certificate * Summary, Conclusions, and Recommendations APPENDICES GLOSSARY 2009-11-27T09:06:11Z 2009-11-27T09:06:11Z 2004 Book http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1351 en application/octet-stream CRC Press |
institution |
Thư viện Trường Đại học Đà Lạt |
collection |
Thư viện số |
language |
English |
description |
With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape. Although these technologies have been around for over twenty years, this legislative move will surely boost e-commerce activity. Secure electronic business transactions, such as contracts, legal documents, insurance, and bank loans are now legally recognized. In order to adjust to the realities of the marketplace, other services may be needed, such as a non-repudiation service, digital notary, or digital time-stamping service. The collection of these components, known as Public Key Infrastructure (PKI), is paving the way for secure communications within organizations and on the public Internet. |
format |
Book |
author |
R Vacca, John |
spellingShingle |
R Vacca, John Public Key Infrastructure: Building Trusted Applications and Web Services |
author_facet |
R Vacca, John |
author_sort |
R Vacca, John |
title |
Public Key Infrastructure: Building Trusted Applications and Web Services |
title_short |
Public Key Infrastructure: Building Trusted Applications and Web Services |
title_full |
Public Key Infrastructure: Building Trusted Applications and Web Services |
title_fullStr |
Public Key Infrastructure: Building Trusted Applications and Web Services |
title_full_unstemmed |
Public Key Infrastructure: Building Trusted Applications and Web Services |
title_sort |
public key infrastructure: building trusted applications and web services |
publisher |
CRC Press |
publishDate |
2009 |
url |
http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1351 |
_version_ |
1757662263218536448 |