What are the nails for which public key technologies are supposed to be the hammer? This paper examines the kinds of assertions that e-business needs to be authenticated, and evaluates conventional and alternative public key infrastructures (PKI) against those requirements. It concludes that the root cause of the limited success enjoyed by public key technologies has been inadequate requirements analysis, and proposes how PKI can be re-conceived in order to meet the real needs of e-business.. 1
With the growth of Information Technology and the Internet, governments apply the same principles an...
All human co-operation is based on trust, meaning that we choose co-operation partners and make com...
PKI system supports user authentication, message transmission, data integrity, message storage confi...
It has been conventional wisdom that, for e-commerce to fulfil its potential, each party to a transa...
Public Key Infrastructure around the world has had mixed success over the past ten years. Some juris...
Electronic communications have become the most important kind of communications in business. However...
According to recent surveys, one of the most severe restraining factors for the proliferation of E-c...
Context: Public key infrastructure is used in various systems and services that we use on adaily bas...
The use of insecure networks -such as the Internet- to send and receive information has made the nee...
The growth of open networks created the interest to commercialise it. The establishment of an electr...
Includes bibliographical references (page 31).Security for electronic commerce has become increasing...
Public-key cryptography is fast becoming the foundation for online commerce and other applications t...
Security mechanisms can only be effective if they are usable as well. Above all, this statement appl...
Abstract Purpose -To overview and discuss the technical, economical, legal, and social reasons why p...
The purpose of this chapter is to identify the major shortcomings of current digital signature techn...
With the growth of Information Technology and the Internet, governments apply the same principles an...
All human co-operation is based on trust, meaning that we choose co-operation partners and make com...
PKI system supports user authentication, message transmission, data integrity, message storage confi...
It has been conventional wisdom that, for e-commerce to fulfil its potential, each party to a transa...
Public Key Infrastructure around the world has had mixed success over the past ten years. Some juris...
Electronic communications have become the most important kind of communications in business. However...
According to recent surveys, one of the most severe restraining factors for the proliferation of E-c...
Context: Public key infrastructure is used in various systems and services that we use on adaily bas...
The use of insecure networks -such as the Internet- to send and receive information has made the nee...
The growth of open networks created the interest to commercialise it. The establishment of an electr...
Includes bibliographical references (page 31).Security for electronic commerce has become increasing...
Public-key cryptography is fast becoming the foundation for online commerce and other applications t...
Security mechanisms can only be effective if they are usable as well. Above all, this statement appl...
Abstract Purpose -To overview and discuss the technical, economical, legal, and social reasons why p...
The purpose of this chapter is to identify the major shortcomings of current digital signature techn...
With the growth of Information Technology and the Internet, governments apply the same principles an...
All human co-operation is based on trust, meaning that we choose co-operation partners and make com...
PKI system supports user authentication, message transmission, data integrity, message storage confi...