Stepping Beyond the PKI Pilot
نویسنده
چکیده
Despite much of the negative publicity that it has suffered recently, Public Key Infrastructure (PKI) continues to play a critical role in underpinning security on the Internet and other potentially hostile network environments. In such environments, it is common to deploy secure protocols to deliver one or more standard network security services (authentication, confidentiality protection, integrity protection and sometimes non-repudiation) so that individuals and/or organisations can communicate securely. Whilst all this can be achieved without using PKI, setting up and maintaining the trust relationships that support these protocols turns out to be a major challenge when there are many parties involved. This is the challenge that PKI solves – it provides a framework, which allows a Trusted Third Party (TTP) to extend trust to other individuals or organisations (known as subscribers in this context), thereby providing them with a context to support some kind of exchange or transaction. In addition to providing a trust framework, PKI is also a useful way of standardising the implementation of the security services as it is based on the use of (usually X.509) certificates and standard, public key algorithms.
منابع مشابه
Beyond the Limitations of API RP-14E Erosional Velocity -A Field Study for Gas Condensate Wells
Fluid velocity has the potential to cause severe erosion damage to oil & gas production infrastructure. In order to avoid or alleviate damage due to erosion, the American Petroleum Institute Recommended Practice (API RP) 14E recommends a threshold fluid velocity for production tubing and pipelines. However, field and laboratory data have proven that the applied empirical constants, known as C-f...
متن کاملInter/Intra Core Network Security with PKI for 3G-and-Beyond Systems
With a large number of different heterogeneous network technologies (e.g. UMTS, WLAN, HIPERLAN) and operators expected in the future mobile communications environment, that should frequently and seamlessly interwork with each other and a constantly increasing population of communication parties, capturing the full benefits of open channel key transfers and scaling public key methods requires Pu...
متن کاملA QSAR Study of HIV Protease Inhibitors Using Computational Descriptors to Prediction of pki of Cycle Derivatives of Urea
Preventing and reducing the spread of HIV (HIV) has always been a concern in medical science. One of the most common ways to control the virus is using enzyme-blocking drugs. In this study, we attempted to predict the biological activity (PKi) of organic urea derivatives in protease inhibitor compounds using molecular modeling using QSAR (Quantitative Structure Activity Relation), which is the ...
متن کاملCurrent Trends in IT - Security – Pragmatic Approaches
Early PKI projects fell short in getting the critical mass of users subscribed because they were too expensive and to ambigious. Now, beyond the hype, there is a demand for improvement of security step by step rather than for big projects. Now, linking up existing PKI-islands, using S/MIME, introducing single sign-on and rising awareness are hot topics. Our vision, however, remains a globally a...
متن کاملGrid Cryptographic Simulation: A Simulator to Evaluate the Scalability of the X.509 Standard in the Smart Grid
PKI may be pushed beyond known limits when scaled to some visions of the smart grid; our research developed a simulation, Grid Cryptographic Simulation (GCS), to evaluate these potential issues, identify cryptographic bottlenecks, and evaluate tradeoffs between performance and security. Ultimately, GCS can be used to identify scalability challenges and suggest improvements to make PKI more effi...
متن کامل