Technological infrastructure for PKI and digital certification

Secure E-Commerce and VPN technology is only possible with the use of appropriate security systems such as encryption, digital signatures, digital certificates, public/private key pairs, non-repudiation, and time-stamping. A PKI comprises a system of certificates, certificate authorities, subjects,...

Full description

Saved in:
Bibliographic Details
Published inComputer communications Vol. 24; no. 14; pp. 1460 - 1471
Main Author Hunt, Ray
Format Journal Article
LanguageEnglish
Published Elsevier B.V 15.09.2001
Subjects
Online AccessGet full text
ISSN0140-3664
1873-703X
DOI10.1016/S0140-3664(01)00293-6

Cover

Loading…
More Information
Summary:Secure E-Commerce and VPN technology is only possible with the use of appropriate security systems such as encryption, digital signatures, digital certificates, public/private key pairs, non-repudiation, and time-stamping. A PKI comprises a system of certificates, certificate authorities, subjects, relying partners, registration authorities, and key repositories that provide for safe and reliable E-business. This paper discusses these key technologies focusing particularly on recent standardisation as well as looking at some of the criticism and challenges to its widespread operation in the industry.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ISSN:0140-3664
1873-703X
DOI:10.1016/S0140-3664(01)00293-6