Stepping Beyond the PKI Pilot

نویسنده

  • Steve Purser
چکیده

Despite much of the negative publicity that it has suffered recently, Public Key Infrastructure (PKI) continues to play a critical role in underpinning security on the Internet and other potentially hostile network environments. In such environments, it is common to deploy secure protocols to deliver one or more standard network security services (authentication, confidentiality protection, integrity protection and sometimes non-repudiation) so that individuals and/or organisations can communicate securely. Whilst all this can be achieved without using PKI, setting up and maintaining the trust relationships that support these protocols turns out to be a major challenge when there are many parties involved. This is the challenge that PKI solves – it provides a framework, which allows a Trusted Third Party (TTP) to extend trust to other individuals or organisations (known as subscribers in this context), thereby providing them with a context to support some kind of exchange or transaction. In addition to providing a trust framework, PKI is also a useful way of standardising the implementation of the security services as it is based on the use of (usually X.509) certificates and standard, public key algorithms.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Beyond the Limitations of API RP-14E Erosional Velocity -A Field Study for Gas Condensate Wells

Fluid velocity has the potential to cause severe erosion damage to oil & gas production infrastructure. In order to avoid or alleviate damage due to erosion, the American Petroleum Institute Recommended Practice (API RP) 14E recommends a threshold fluid velocity for production tubing and pipelines. However, field and laboratory data have proven that the applied empirical constants, known as C-f...

متن کامل

Inter/Intra Core Network Security with PKI for 3G-and-Beyond Systems

With a large number of different heterogeneous network technologies (e.g. UMTS, WLAN, HIPERLAN) and operators expected in the future mobile communications environment, that should frequently and seamlessly interwork with each other and a constantly increasing population of communication parties, capturing the full benefits of open channel key transfers and scaling public key methods requires Pu...

متن کامل

A QSAR Study of HIV Protease Inhibitors Using Computational Descriptors to Prediction of pki of Cycle Derivatives of Urea

Preventing and reducing the spread of HIV (HIV) has always been a concern in medical science. One of the most common ways to control the virus is using enzyme-blocking drugs. In this study, we attempted to predict the biological activity (PKi) of organic urea derivatives in protease inhibitor compounds using molecular modeling using QSAR (Quantitative Structure Activity Relation), which is the ...

متن کامل

Current Trends in IT - Security – Pragmatic Approaches

Early PKI projects fell short in getting the critical mass of users subscribed because they were too expensive and to ambigious. Now, beyond the hype, there is a demand for improvement of security step by step rather than for big projects. Now, linking up existing PKI-islands, using S/MIME, introducing single sign-on and rising awareness are hot topics. Our vision, however, remains a globally a...

متن کامل

Grid Cryptographic Simulation: A Simulator to Evaluate the Scalability of the X.509 Standard in the Smart Grid

PKI may be pushed beyond known limits when scaled to some visions of the smart grid; our research developed a simulation, Grid Cryptographic Simulation (GCS), to evaluate these potential issues, identify cryptographic bottlenecks, and evaluate tradeoffs between performance and security. Ultimately, GCS can be used to identify scalability challenges and suggest improvements to make PKI more effi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004