Public Key Infrastructure: Building Trusted Applications and Web Services

Public Key Infrastructure: Building Trusted Applications and Web Services

by John R. Vacca

Hardcover

$28.75 $115.00 Save 75% Current price is $28.75, Original price is $115. You Save 75%.
View All Available Formats & Editions
  • Get it by Wednesday, May 23 ,  Order by 12:00 PM Eastern and choose Expedited Delivery during checkout.
    Same Day delivery in Manhattan. 
    Details

Overview

Public Key Infrastructure: Building Trusted Applications and Web Services by John R. Vacca

With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape. Although these technologies have been around for over twenty years, this legislative move will surely boost e-commerce activity. Secure electronic business transactions, such as contracts, legal documents, insurance, and bank loans are now legally recognized. In order to adjust to the realities of the marketplace, other services may be needed, such as a non-repudiation service, digital notary, or digital time-stamping service. The collection of these components, known as Public Key Infrastructure (PKI), is paving the way for secure communications within organizations and on the public Internet.

Product Details

ISBN-13: 9780849308222
Publisher: Taylor & Francis
Publication date: 05/14/2004
Pages: 448
Product dimensions: 6.12(w) x 9.25(h) x 1.20(d)

Table of Contents

OVERVIEW OF PKI TECHNOLOGY
Public Key Infrastructures (PKIs): What Are They?
Type of Certificate Authorities (CAS) Services
PKI Standards
Types of Vendor and Third-Party CA Systems
Protecting Private Keys
CA System Attacks
Stolen Private Keys: What Can Be Done?
Certificate Practice Statements
PKI Readiness
ANALYZING AND DESIGNING PUBLIC KEY INFRASTRUCTURES
PKI Design Issues
Cost Justification and Consideration
PKI Standards Design Issues
PKI Architectural Design Considerations
IMPLEMENTING PKI
Requirements
Implementation Schedule
Implementation Costs
PKI Performance
MANAGING PKI
Requesting a Certificate
Obtaining a Certificate
Storing a Certificate within the Browser
Using a Certificate
Revoking a Certificate
Summary, Conclusions, and Recommendations
APPENDICES
GLOSSARY

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews