Javascript must be enabled to continue!
Public Key Infrastructure (PKI)
View through CrossRef
AbstractTo use public key cryptography effectively on the Internet, one must know the owner of the private key that corresponds to a published public key. Public key infrastructure (PKI) provides this information. The workings of public key cryptography are not addressed here (for more on that topic, see the chapter on encryption). Rather, this chapter describes the basic concepts and components of PKI, comparing and contrasting alternative PKI architectures. Public key certificates, certificate revocation, and the protocols used in PKI management are described. Policies and procedures employed by a certification authority (CA) are also discussed. Attribute certificates, when used in conjunction with public key certificates, provide authorization information in addition to identification and authentication. Finally, future PKI developments are discussed.
Title: Public Key Infrastructure (PKI)
Description:
AbstractTo use public key cryptography effectively on the Internet, one must know the owner of the private key that corresponds to a published public key.
Public key infrastructure (PKI) provides this information.
The workings of public key cryptography are not addressed here (for more on that topic, see the chapter on encryption).
Rather, this chapter describes the basic concepts and components of PKI, comparing and contrasting alternative PKI architectures.
Public key certificates, certificate revocation, and the protocols used in PKI management are described.
Policies and procedures employed by a certification authority (CA) are also discussed.
Attribute certificates, when used in conjunction with public key certificates, provide authorization information in addition to identification and authentication.
Finally, future PKI developments are discussed.
Related Results
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical
The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
Peristiwa G30S/PKI Pada Stabilitas Sosial Di Bandar Betsy 1965 - 1998
Peristiwa G30S/PKI Pada Stabilitas Sosial Di Bandar Betsy 1965 - 1998
Pembantaian yang terjadi 14 Mei 1965 itu dikenal dengan nama „Peristiwa Bandar Betsy‟. Tugu Letda Sudjono yang berdiri di tengah kebun Bandar Betsy, Kecamatan Bandar Huluan, Kabupa...
KONTROVERSI KETERLIBATAN SOEHARTO DALAM PENUMPASAN G30S/PKI 1965
KONTROVERSI KETERLIBATAN SOEHARTO DALAM PENUMPASAN G30S/PKI 1965
Gerakan 30 September (disingkat G.30.S/PKI) atau Gestapu (Gerakan September Tiga Puluh) dan  Gestok (Gerakan Satu Oktober) adalah sebuah peristiwa yang terjadi Kamis malam tanggal...
Seditious Spaces
Seditious Spaces
The title ‘Seditious Spaces’ is derived from one aspect of Britain’s colonial legacy in Malaysia (formerly Malaya): the Sedition Act 1948. While colonial rule may seem like it was ...
Guidelines for Derived Personal Identity Verification (PIV) Credentials
Guidelines for Derived Personal Identity Verification (PIV) Credentials
This recommendation provides technical guidelines for the implementation of standards-based, secure, reliable credentials that are issued by federal departments and agencies to ind...
Theoretical grounds of the development of innovation infrastructure
Theoretical grounds of the development of innovation infrastructure
The object of this research is the innovation infrastructure. The subject is the key theoretical approaches towards comprehension of innovation infrastructure, subsystems of innova...
Infrastructure development, informal economy, and gender inequality in Sub-Saharan Africa
Infrastructure development, informal economy, and gender inequality in Sub-Saharan Africa
Infrastructure development policies have been criticised for lacking a deliberate pro-gender and pro-informal sector orientation. Since African economies are dual enclaves, with th...
Leveraging Digital-Physical Integration for Enhanced Infrastructure Management
Leveraging Digital-Physical Integration for Enhanced Infrastructure Management
The built environment (BE) across various sectors faces significant challenges due to increasing deterioration, ageing infrastructure, extreme climatic conditions, rising urban pop...

