Cryptography: Theory and Practice
Cryptography: Theory and Practice
Efficient Certificate Revocation
Efficient Certificate Revocation
SP 800-52. Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations
SP 800-52. Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations
PKI Security in Large-Scale Healthcare Networks
Journal of Medical Systems
Hi-index | 0.00 |
The architecture chosen for a public key infrastructure (PKI) determines the scalability and usability experienced by PKI users. Enterprise PKIs typically consist of a single certificate authority (CA) or small hierarchy of CAs along with a single directory system. These enterprise architectures have limited scalability, but simplify PKI client implementations. As enterprises seek to link their PKIs to support security services across organizational boundaries, networks of CAs and PKIs, based on the bridge CA concept, are emerging.A new PKI component, the validation authority, has been introduced to simplify the interface to today's complex PKIs. This article provides a guide to PKI architecture that satisfies an organization's security goals.