Acceptance of Digital Signatures: A Matter of Trust

نویسنده

  • Matthew J. Stifel
چکیده

Trust between two entities is necessary before digital signatures techniques can be implemented. The US Federal Government has developed a “bridge” architecture to extend trust beyond a single trust domain. In sharp contrast to the bridge architecture exists the “end user” trust model. Both methods can be used to exchange digital signatures, however, the process to obtain Federal Bridge status is much more rigorous. This paper will explore the legality of digital signatures, the foundations of trust and processes and technologies to implement them. Evaluation techniques will be used to compare the two methods and the paper will conclude with a recommendation as to why the bridge method is the best choice for a large corporation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Creating the Legal Framework for ICT Development: The Example of E-Signature Legislation in Emerging Market Economies

Conducting business and offering e-government services in the global digital environment present important questions of the legal validity of electronic documents and complex issues of trust and authentication. Governments and policy experts have grappled with ways to provide certainty and trust to businesses and citizens engaging in transactions online. One solution that has received considera...

متن کامل

Certifying Trust

A basic function of all signatures, digital or not, is to express trust and authority, explicit or implied. This is especially the case with digital signatures used in certificates. In this paper, we study the trust relationships expressed by the certificates used in X.509, PGP and SPKI. Especially, we present and revise the idea of a certificate loop, or a loop of certificates from the verifyi...

متن کامل

Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications

The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphi...

متن کامل

Referee: trust management for Web applications

Digital signatures provide a mechanism for guaranteeing integrity and authenticity of Web content but not more general notions of security or trust. Web-aware applications must permit users to state clearly their own security policies and, of course, must provide the cryptographic tools for manipulating digital signatures. This paper describes the REFEREE trust management system for Web applica...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005