The US Federal PKI and the Federal Bridge Certification Authority
نویسنده
چکیده
The goals of the U.S. Federal PKI are to create a cross-governmental, ubiquitous, interoperable Public Key Infrastructure and the development and use of applications which employ that PKI in support of Agency business processes. In addition, the U.S. Federal PKI must interoperate with State governments and with other national governments. Our goals recognize that the purpose of deploying a PKI is to provide secure electronic government services utilizing Internet technology, not only to satisfy the little hearts of a dedicated cadre of techno-nerds and paranoiac security gurus but to serve the citizenry. While it is fair to say that PKI technology today is powerful and deployable, nobody who is even the least familiar with it would claim that it is simple and straightforward to implement, let alone structure an aggregation of PKIs. Which leads us to ask the question: Why a U.S. Federal PKI? The simple answer is that U.S. Federal Agencies are mandated by the Government Paperwork Elimination Act of 1998 to begin providing electronic government services by October 21, 2003. While this Act does not require us to implement PKI – the law is technology neutral – it is clear that PKI, especially coupled with biometrics and hardware tokens, offers higher levels of identity security than can be provided by handwritten signatures or any other electronic signature alternative at the present time. For a good, brief comparison of electronic signature alternatives currently available I recommend that you look at the guidance provided by the U.S. If you look behind the bureaucracy of the Act – and of several like bills under consideration by the U.S. Congress at the present time – you discover that there is a strong belief on the part of legislators and economists that government productivity may be dramatically improved by replacing people and paper processes with electronic processes. While there is much truth to this assumption, we must be candid and admit that the transition to electronic processes entails substantial investments of time and money, especially where we are implementing a new technology that is unfamiliar and complex, and which challenges preconceptions about law and security. Nevertheless, the public wants more and better government services at lower cost with greater security, and for all practical purposes only electronic government, with security provided by PKI (and in some cases by other means) can hope to satisfy those requirements. Notwithstanding privacy concerns, the public increasingly buys …
منابع مشابه
A Secure Access Control Mechanism Web Service-based in Extended Organization PKI Networks
Organizations use PKI (Public Key Infrastructures) to support internal business processes, but some businesses have industrial partnerships with others, and these alliances can exploit B2B (Business to Business) e-commerce capabilities by connecting corporate PKI. The paper deals with two methods to realize access control in extended organization PKI business processes: BCAs (Bridge Certificati...
متن کاملA Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls
Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (PKI). A PKI, in turn, consists of one or several certification authorities (CAs) that issue and revoke certificates for users and other CAs. Contrary to its conceptual simplicity, the establishment and operational maint...
متن کاملEstablishment of the temporary certification program for health information technology. Final rule.
This final rule establishes a temporary certification program for the purposes of testing and certifying health information technology. This final rule is established under the authority granted to the National Coordinator for Health Information Technology (the National Coordinator) by section 3001(c)(5) of the Public Health Service Act (PHSA), as added by the Health Information Technology for ...
متن کاملNutrient Interaction and Health Risk Assessment of Cereal Grains on Nigerian’s Markets
Background: Cereals are the most staple foods in human diet and the main components of the daily diet. This work was designed to determine the level of essential and non-essential elements, the in vitro bioavailability, interrelationship, and associated health risk in consumed cereal grains in Nigeria to assess their safety and wholesomeness. Methods: The contents of phytate, oxalate, and some...
متن کاملMoving Toward an IPv 6 Future
Generally speaking, a public key infrastructure (PKI) is a set of hardware, software, people, and procedures needed to create, manage, store, distribute, and revoke public key certificates. With these in place, a PKI can provide trusted and efficient privateand publickey certificate management, thus enabling the use of authentication, nonrepudiation, and confidential security services. To provi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computer Networks
دوره 37 شماره
صفحات -
تاریخ انتشار 2001