With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape. Although these technologies have been around for over twenty years, this legislative move will surely boost e-commerce activity. Secure electronic business transactions, such as contracts, legal documents, insurance, and bank loans are now legally recognized. In order to adjust to the realities of the marketplace, other services may be needed, such as a non-repudiation service, digital notary, or digital time-stamping service. The collection of these components, known as Public Key Infrastructure (PKI), is paving the way for secure communications within organizations and on the public Internet.
|Publisher:||Taylor & Francis|
|Product dimensions:||6.12(w) x 9.25(h) x 1.20(d)|
Table of Contents
OVERVIEW OF PKI TECHNOLOGY
Public Key Infrastructures (PKIs): What Are They?
Type of Certificate Authorities (CAS) Services
Types of Vendor and Third-Party CA Systems
Protecting Private Keys
CA System Attacks
Stolen Private Keys: What Can Be Done?
Certificate Practice Statements
ANALYZING AND DESIGNING PUBLIC KEY INFRASTRUCTURES
PKI Design Issues
Cost Justification and Consideration
PKI Standards Design Issues
PKI Architectural Design Considerations
Requesting a Certificate
Obtaining a Certificate
Storing a Certificate within the Browser
Using a Certificate
Revoking a Certificate
Summary, Conclusions, and Recommendations