Public key infrastructure: a micro and macro analysis

被引:6
|
作者
Lancaster, S
Yen, DC
Huang, SM
机构
[1] Miami Univ, Dept DSC & MIS, Oxford, OH 45056 USA
[2] Natl Chung Cheng Univ, Dept Informat Management, Chiayi, Taiwan
关键词
cryptography; digital security; digital signatures; E-commerce; electronic security; encryption; internet privacy; public key infrastructure; PKI;
D O I
10.1016/S0920-5489(03)00043-6
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet has increasingly been used for communication between people. Most users have no problem relaying messages, which do not contain confidential information, over a network. Yet, for it to be accepted as a medium of conducting monetary transactions there will need to be a higher degree of confidence in the technology's reliability and security. No one will agree to send his or her financial information over the Internet if there is any doubt in the security of that medium. Likewise, companies involved in E-commerce must have a means to verify the customers using the Internet to order goods and services. Public Key Infrastructure, PKI, attempts to provide the answer to the reliability question, as a method of digital security. PKI provides the ability to verify the sender and the recipient of electronic messages, protecting against E-commerce fraud, corporate espionage, and the theft of intellectual property. (C) 2003 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:437 / 446
页数:10
相关论文
共 50 条
  • [1] Analysis of public key infrastructure systems for authentication
    Kim, JW
    Cho, HJ
    Hwang, IS
    Park, SY
    Lee, JK
    INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, PROCEEDINGS, 1999, : 187 - 192
  • [2] Classification as an approach to public key infrastructure requirements analysis
    Prodanovic, Radomir
    Vulic, Ivan
    IET SOFTWARE, 2019, 13 (06) : 518 - 527
  • [3] Options analysis of the Canadian Forces Public Key Infrastructure
    DePlanché, DE
    Knight, GS
    Rahman, MH
    2000 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, CONFERENCE PROCEEDINGS, VOLS 1 AND 2: NAVIGATING TO A NEW ERA, 2000, : 851 - 855
  • [4] The Internet public key infrastructure
    Benantar, M
    IBM SYSTEMS JOURNAL, 2001, 40 (03) : 648 - 665
  • [5] Optimization of a Public Key Infrastructure
    Fongen, Anders
    2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, 2011, : 1440 - 1447
  • [6] An Enhanced Public Key Infrastructure
    Lim, Boon-Hock
    Tan, Syh-Yuan
    Yau, Wei-Chuen
    2013 INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2013,
  • [7] Unified Public Key Infrastructure
    Efimov, IN
    Galkin, OI
    Mescheriakov, RV
    EDM 2005: International Workshop and Tutorials on Electron Devices and Materials, Proceedings, 2005, : 240 - 242
  • [8] Public Key Infrastructure for Public Administration in Romania
    Vatra, Nicusor
    PROCEEDINGS OF THE 2010 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2010, : 481 - 484
  • [9] On splitting public keys for the public key infrastructure
    Cristiano, S
    Liu, FF
    2005 IEEE INTERNATIONAL CONFERENCE ON E-TECHNOLOGY, E-COMMERCE AND E-SERVICE, PROCEEDINGS, 2005, : 112 - 115
  • [10] rpkiller: Threat Analysis of the BGP Resource Public Key Infrastructure
    Van Hove, Koen
    van der Ham-de Vos, Jeroen
    van Rijswijk-Deij, Roland
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2023, 4 (04):