Public Key Infrastructure - John R. Vacca

Public Key Infrastructure

Building Trusted Applications and Web Services

(Autor)

Buch | Hardcover
448 Seiten
2004
Auerbach (Verlag)
978-0-8493-0822-2 (ISBN)
149,60 inkl. MwSt
By allowing digital signatures to be as valid as handwritten signatures, public key infrastructure (PKI) provides businesses with a quick alternative to the sometimes lengthy process of documentation. This book shows programmers and engineers how to build appropriate layers of security throughout the network.
With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape. Although these technologies have been around for over twenty years, this legislative move will surely boost e-commerce activity. Secure electronic business transactions, such as contracts, legal documents, insurance, and bank loans are now legally recognized. In order to adjust to the realities of the marketplace, other services may be needed, such as a non-repudiation service, digital notary, or digital time-stamping service. The collection of these components, known as Public Key Infrastructure (PKI), is paving the way for secure communications within organizations and on the public Internet.

Vacca, John R.

OVERVIEW OF PKI TECHNOLOGY. Public Key Infrastructures (PKIs): What Are They? Type of Certificate Authorities (Cas) Services. PKI Standards. Types of Vendor and Third-Party CA Systems. Protecting Private Keys. CA System Attacks. Stolen Private Keys: What Can Be Done? Certificate Practice Statements. PKI Readiness. ANALYZING AND DESIGNING PUBLIC KEY INFRASTRUCTURES. PKI Design Issues. Cost Justification and Consideration. PKI Standards Design Issues. PKI Architectural Design Considerations. IMPLEMENTING PKI. Requirements. Implementation Schedule. Implementation Costs. PKI Performance. MANAGING PKI. Requesting a Certificate. Obtaining a Certificate. Storing a Certificate Within the Browser. Using a Certificate. Revoking a Certificate. Summary, Conclusions, and Recommendations. APPENDICES. GLOSSARY.

Erscheint lt. Verlag 11.5.2004
Verlagsort London
Sprache englisch
Maße 156 x 234 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Software Entwicklung
Informatik Theorie / Studium Kryptologie
Recht / Steuern Privatrecht / Bürgerliches Recht IT-Recht
ISBN-10 0-8493-0822-4 / 0849308224
ISBN-13 978-0-8493-0822-2 / 9780849308222
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
69,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00