Technological infrastructure for PKI and digital certification
Secure E-Commerce and VPN technology is only possible with the use of appropriate security systems such as encryption, digital signatures, digital certificates, public/private key pairs, non-repudiation, and time-stamping. A PKI comprises a system of certificates, certificate authorities, subjects,...
Saved in:
Published in | Computer communications Vol. 24; no. 14; pp. 1460 - 1471 |
---|---|
Main Author | |
Format | Journal Article |
Language | English |
Published |
Elsevier B.V
15.09.2001
|
Subjects | |
Online Access | Get full text |
ISSN | 0140-3664 1873-703X |
DOI | 10.1016/S0140-3664(01)00293-6 |
Cover
Loading…
Summary: | Secure E-Commerce and VPN technology is only possible with the use of appropriate security systems such as encryption, digital signatures, digital certificates, public/private key pairs, non-repudiation, and time-stamping. A PKI comprises a system of certificates, certificate authorities, subjects, relying partners, registration authorities, and key repositories that provide for safe and reliable E-business. This paper discusses these key technologies focusing particularly on recent standardisation as well as looking at some of the criticism and challenges to its widespread operation in the industry. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
ISSN: | 0140-3664 1873-703X |
DOI: | 10.1016/S0140-3664(01)00293-6 |