Public Key Infrastructure: Building Trusted Applications and Web Services

  • 6h 44m
  • John R. Vacca
  • CRC Press
  • 2004

With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape. Although these technologies have been around for over twenty years, this legislative move will surely boost e-commerce activity. Secure electronic business transactions, such as contracts, legal documents, insurance, and bank loans are now legally recognized. In order to adjust to the realities of the marketplace, other services may be needed, such as a non-repudiation service, digital notary, or digital time-stamping service. The collection of these components, known as Public Key Infrastructure (PKI), is paving the way for secure communications within organizations and on the public Internet.

In this Book

  • Foreword
  • Introduction
  • Public Key Infrastructures (PKIs)—What Are They?
  • Growing a Tree of Trust
  • In Pki We Trust?
  • PKI Standards
  • Types of Vendor and Third-Party CA Systems
  • Understanding Digital Certificates and Secure Sockets Layer (SSL)
  • CA System Attacks
  • Key Escrow versus Key Recovery
  • An Approach to Formally Compare and Query Certification Practice Statements
  • Managed Public Key Infrastructure—Securing Your Business Applications
  • PKI Readiness
  • PKI Design Issues
  • PKI Return on Investment
  • PKI Standards Design Issues
  • Architecture for Public Key Infrastructure (APKI)
  • Implementing Secure Web Services Requirements Using PKI
  • VeriSign's Foundation in Managed Security Services
  • Implementation and Deployment
  • Implementation Costs
  • PKI Performance
  • Requesting a Certificate
  • Obtaining A Certificate
  • Ten Risks of PKI—What You are Not Being Told about Public Key Infrastructure
  • Using a Certificate
  • Certificate Revocation with VeriSign Managed PKI—Flexible, Open Revocation Solutions for Today's Enterprise PKI Needs
  • Summary, Conclusions, and Recommendations
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.2 of 74 users Rating 4.2 of 74 users (74)
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)