Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Pretty good persuasion: a first step towards effective password security in the real world
Proceedings of the 2001 workshop on New security paradigms
A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI
ISC '02 Proceedings of the 5th International Conference on Information Security
PKI Challenges: An Industry Analysis
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Development of a flexible PERMIS authorisation module for shibboleth and apache server
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
The Design of Everyday Things
Digital certificate management for document workflows in E-government services
EGOV'10 Proceedings of the 9th IFIP WG 8.5 international conference on Electronic government
Hi-index | 0.00 |
In this paper we categorise some of the challenges facing those building, deploying and using Public Key Infrastructures (PKIs). Our work is based on a series of in-depth interviews and analysis. The aim of the work in this paper is twofold: to present the conclusions drawn from work that is based on years of practical experience of those in the field; to analyse those conclusions in order to highlight research avenues that will answer the challenges raised by those in industry.