PKI: Implementing and Managing E-Security

  • Authors:
  • Andrew Nash;William Duane;Celia Joseph

  • Affiliations:
  • -;-;-

  • Venue:
  • PKI: Implementing and Managing E-Security
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

From the Publisher:Written by the experts at RSA Security,this book will show you how to secure transactions and develop customer trust in e-commerce through the use of PKI technology. Part of the RSA Press Series. Implement PKI technology and enable secure Web transactions Conduct online business safely by following the implementation techniques found inside this essential guide to PKI technology. Written by the experts at RSA security,this book provides comprehensive coverage of this emerging technology that uses digital certificates to secure Internet transactions. Beginning with an introduction to cryptography,this book explains the technology that creates a public-key infrastructure,and outlines the necessary steps for implementing PKI in both business-to-business and business-to-consumer environments. Also included is material on WAP,authorization systems,and cost of ownership,making this the most in-depth reference on PKI available. This book will show you how to:Understand basic principles of cryptographic systemsLearn how a public key infrastructure supplies security services for electronic commerce deploymentsGet details on applicable standards ITU-X. 500,IETF-PKIX,and WAPApply certificates for authentication,time stamping,and non-repudiationManage key and certificate life cycles within a public key infrastructureManage the PKIX architecture and the PKI protocols that allow interoperability between different vendor implementationsUnderstand how trust models can be used to establish relationships between organizations Follow case studies to solve common problems encountered when implementing PKI