Using public-key infrastructures for security and risk management

被引:3
|
作者
Wing, P
O'Higgins, B
机构
[1] Scotiabank
关键词
Data privacy - Data structures - Risk management - Security of data;
D O I
10.1109/35.790867
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Companies around the world are embracing electronic commerce, and within two years this long-heralded yet largely unrealized "killer application" for the Internet is poised for explosive 300 percent growth, according to Deloitte Consulting's 1998 Global Survey of Chief Information Executives. Security is an essential ingredient in enabling these electronic transactions. The fundamental requirements are to identify and authenticate the parties involved, and to protect the information from compromise. This article will describe the elements of public-key infrastructures, and show how they are well suited to provide these security services. The pioneering experience of Scotiabank, an early adopter of PKI technology and operator of one of the largest deployed PKIs on the Internet, is outlined.
引用
收藏
页码:71 / 73
页数:3
相关论文
共 50 条
  • [21] Information security, mathematics, and public-key cryptography
    Blake-Wilson, S
    DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) : 77 - 99
  • [22] Security analysis of public-key watermarking schemes
    Craver, S
    Katzenbeisser, S
    MATHEMATICS OF DATA/IMAGE CODING, COMPRESSION, AND ENCRYPTION IV, WITH APPLICATIONS, 2001, 4475 : 172 - 182
  • [23] On the security notions for public-key encryption schemes
    Phan, DH
    Pointcheval, D
    SECURITY IN COMMUNICATION NETWORKS, 2005, 3352 : 33 - 46
  • [24] Information Security, Mathematics, and Public-Key Cryptography
    Simon Blake-Wilson
    Designs, Codes and Cryptography, 2000, 19 : 77 - 99
  • [25] On the security of a modified Paillier public-key primitive
    Sakurai, K
    Takagi, T
    INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 436 - 448
  • [26] Revocation-free public-key encryption based on security-mediated public-key infrastructure
    Lo, C. -M.
    Hwang, T.
    Li, C. -M.
    IET INFORMATION SECURITY, 2007, 1 (03) : 134 - 141
  • [27] Public key infrastructures that satisfy security goals
    Polk, WT
    Hastings, NE
    Malpani, A
    IEEE INTERNET COMPUTING, 2003, 7 (04) : 60 - 67
  • [28] RESISTING IMPERSONATION ATTACKS IN CHAINING-BASED PUBLIC-KEY MANAGEMENT ON MANETS The Virtual Public-key Management
    Fischer e Silva, Renan
    da Silva, Eduardo
    Pessoa Albini, Luiz Carlos
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 155 - 158
  • [29] Security and reliability of LDPC based public-key cryptosystems
    Saad, D
    Skantzos, NS
    Kabashima, Y
    PROGRESS OF THEORETICAL PHYSICS SUPPLEMENT, 2005, (157): : 229 - 236
  • [30] A CRITICAL ANALYSIS OF THE SECURITY OF KNAPSACK PUBLIC-KEY ALGORITHMS
    DESMEDT, YG
    VANDEWALLE, JP
    GOVAERTS, RJM
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1984, 30 (04) : 601 - 611