Getting Started with PKI

نویسنده

  • Harry B. DeMaio
چکیده

INTRODUCTION In the recent history of information protection, there has been an ongoing parade of technologies that loudly promise new and total solutions but frequently do not make it past the reviewing stand. In some cases, they break down completely at the start of the march. In others, they end up turning down a side street. Is Public Key Infrastructure (PKI) just another gaudy float behind more brass bands, or is there sufficient rationale to believe that this one might make it? There are some very good reasons for optimism in this case, but we have been overly optimistic before. This article examines PKI as objectively as possible, in hopes of arriving at some sort of consensus. To do that, one needs to know more than just the design principles. Many a slick and sophisticated design has turned embarrassingly sour when implemented and put into application and operational contexts. There are also the questions of economics, market readiness, and operational/technological prerequisites, all of which can march a brilliant idea into a blind alley. P A Y O F F I D E A

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Current Trends in IT - Security – Pragmatic Approaches

Early PKI projects fell short in getting the critical mass of users subscribed because they were too expensive and to ambigious. Now, beyond the hype, there is a demand for improvement of security step by step rather than for big projects. Now, linking up existing PKI-islands, using S/MIME, introducing single sign-on and rising awareness are hot topics. Our vision, however, remains a globally a...

متن کامل

RSA-Based Auto-recoverable Cryptosystems

The deployment of a “public-key infrastructure” (PKI) has recently started. Another recent concern in business and on the national level is the issue of escrowed encryption, key recovery, and emergency access to information (e.g., in the medical record area). Independent development of a PKI and an escrowed PKI (whenever required or desired) will pose a lot of constraints, duplication efforts a...

متن کامل

Critical Review of B2B Commerce PKI Trust Topologies

As more and more companies conduct business with each other over the Internet, interoperable trust frameworks become important. For many businesses, trust provision is a critical issue in commencing B2B commerce transactional services. Communication over the Internet is by default open and uncontrolled and conflicts with the business needs of digital business. Privacy, confidentiality and integ...

متن کامل

Getting Started with Ecclesiastes: Coming to Grips with Mortality

Getting Started with Ecclesiastes: Coming to Grips with Mortality Dr. Elaine Phillips, © 2013 Introduction Ecclesiastes presents the reader with alternately disturbing and oddly reassuring realities. While scholars differ as to whether these views are a comfortable fit with “orthodoxy” and debate how to label and understand the various attitudes expressed, Ecclesiastes unquestionably speaks to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Information Systems Security

دوره 8  شماره 

صفحات  -

تاریخ انتشار 1999