PKI and digital certification infrastructure

Secure VPN technology is only possible with the use of appropriate security systems such as encryption, digital signatures, digital certificates, public/private key pairs, non-repudiation, and time-stamping. A PKI comprises a system of certificates, certificate authorities, subjects, relying partner...

Full description

Saved in:
Bibliographic Details
Published inProceedings - IEEE International Conference on Networks pp. 234 - 239
Main Author Hunt, R.
Format Conference Proceeding
LanguageEnglish
Published IEEE 2001
Subjects
Online AccessGet full text
ISBN0769511874
ISSN1531-2216
DOI10.1109/ICON.2001.962346

Cover

More Information
Summary:Secure VPN technology is only possible with the use of appropriate security systems such as encryption, digital signatures, digital certificates, public/private key pairs, non-repudiation, and time-stamping. A PKI comprises a system of certificates, certificate authorities, subjects, relying partners, registration authorities, and key repositories that provide for safe and reliable communications. This paper discusses these key technologies focusing particularly on standardisation as well as looking at some of the challenges pending its widespread operation in the industry.
ISBN:0769511874
ISSN:1531-2216
DOI:10.1109/ICON.2001.962346