Using public-key infrastructures for security and risk management

被引:3
|
作者
Wing, P
O'Higgins, B
机构
关键词
D O I
10.1109/35.790867
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Companies around the world are embracing electronic commerce, and within two years this long-heralded yet largely unrealized "killer application" for the Internet is poised for explosive 300 percent growth, according to Deloitte Consulting's 1998 Global Survey of Chief Information Executives. Security is an essential ingredient in enabling these electronic transactions. The fundamental requirements are to identify and authenticate the parties involved, and to protect the information from compromise. This article will describe the elements of public-key infrastructures, and show how they are well suited to provide these security services. The pioneering experience of Scotiabank, an early adopter of PKI technology and operator of one of the largest deployed PKIs on the Internet, is outlined.
引用
收藏
页码:71 / 73
页数:3
相关论文
共 50 条
  • [1] KeyNote: Trust management for public-key infrastructures
    Blaze, M
    Feigenbaum, J
    Keromytis, AD
    [J]. SECURITY PROTOCOLS, 1999, 1550 : 59 - 66
  • [2] On the security of a public-key cryptosystem
    Grosek, O
    Magliveras, SS
    Wei, W
    [J]. PUBLIC-KEY CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, 2001, : 71 - 75
  • [3] A model for revocation forecasting in public-key infrastructures
    Ganan, Carlos
    Mata-Diaz, Jorge
    Munoz, Jose L.
    Esparza, Oscar
    Alins, Juanjo
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2015, 43 (02) : 311 - 331
  • [4] Public-key security systems
    Abdelguerfi, M
    Kaliski, BS
    Patterson, W
    [J]. IEEE MICRO, 1996, 16 (03) : 10 - 13
  • [5] Self-escrowed public-key infrastructures
    Paillier, P
    Yung, M
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC'99, 2000, 1787 : 257 - 268
  • [6] A model for revocation forecasting in public-key infrastructures
    Carlos Gañán
    Jorge Mata-Díaz
    Jose L. Muñoz
    Oscar Esparza
    Juanjo Alins
    [J]. Knowledge and Information Systems, 2015, 43 : 311 - 331
  • [7] On the security of hybrid public-key encryption
    Nagao, W
    Manabe, Y
    Okamoto, T
    [J]. ISAS/CITSA 2004: International Conference on Cybernetics and Information Technologies, Systems and Applications and 10th International Conference on Information Systems Analysis and Synthesis, Vol 1, Proceedings: COMMUNICATIONS, INFORMATION TECHNOLOGIES AND COMPUTING, 2004, : 28 - 33
  • [8] On the security of the McEliece public-key cryptosystern
    Sendrier, N
    [J]. INFORMATION, CODING AND MATHEMATICS, 2002, 687 : 141 - 163
  • [9] SECURITY OF OKAMOTO PUBLIC-KEY CRYPTOSYSTEM
    KOYAMA, K
    [J]. ELECTRONICS LETTERS, 1986, 22 (20) : 1033 - 1034
  • [10] Towards logically and physically secure public-key infrastructures
    Viswanathan, K
    Saxena, A
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS, 2002, 2551 : 122 - 134