Enterprise security infrastructure

  • Authors:
  • J. G. Maley

  • Affiliations:
  • -

  • Venue:
  • WET-ICE '96 Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
  • Year:
  • 1996

Quantified Score

Hi-index 0.00

Visualization

Abstract

Many enterprises are taking advantage of the information revolution through business process reengineering, electronic commerce, and electronic data interchange. Many of these same enterprises also use many of the commercial products and services available for protecting an enterprise's information resources. However, what is not as well known is the required foundation for supporting these new protective services and products. This foundation is an enterprise's security infrastructure. In particular, the infrastructure required to support public key technology. The paper offers insight to enterprise planners on the factors necessary to fully and successfully introduce public key technology and its capabilities into the enterprise. A definition for the term security infrastructure is provided along with identifying its objectives and functions. Motivation for such a security infrastructure is introduced by discussing public key (certificate) distribution, trust models, and cross certification. Business units and corporate management participation in the planning and operation of the security infrastructure is also discussed.