PKI and digital certification infrastructure
Secure VPN technology is only possible with the use of appropriate security systems such as encryption, digital signatures, digital certificates, public/private key pairs, non-repudiation, and time-stamping. A PKI comprises a system of certificates, certificate authorities, subjects, relying partner...
Saved in:
Published in | Proceedings - IEEE International Conference on Networks pp. 234 - 239 |
---|---|
Main Author | |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
2001
|
Subjects | |
Online Access | Get full text |
ISBN | 0769511874 |
ISSN | 1531-2216 |
DOI | 10.1109/ICON.2001.962346 |
Cover
Summary: | Secure VPN technology is only possible with the use of appropriate security systems such as encryption, digital signatures, digital certificates, public/private key pairs, non-repudiation, and time-stamping. A PKI comprises a system of certificates, certificate authorities, subjects, relying partners, registration authorities, and key repositories that provide for safe and reliable communications. This paper discusses these key technologies focusing particularly on standardisation as well as looking at some of the challenges pending its widespread operation in the industry. |
---|---|
ISBN: | 0769511874 |
ISSN: | 1531-2216 |
DOI: | 10.1109/ICON.2001.962346 |