One of the current impediments to the wide-spread use of public-key infrastructure is the practice by commercial-sector suppliers of public-key infrastructure of using proprietary and non-standard interfaces for the management of private-key data. The ability to interchange components is required to allow research to continue to occur in a production environment through the use of alternate implementations of components. We argue that open and interoperable interfaces must be provided for all widely-used components of PKI in order to support diverse security architectures and applications, and that sufficient practice and draft standards exist that provide a substantial basis for these required open interfaces. Motivation In order to prov...
This paper describes Public Key Infrastructure (PKI). It is a platform for the realization of secure...
Abstract. In this paper we consider how practical interoperation between a conventional PKI and an i...
In an organization with its own Private Network , it is not just enough to transfer the documents fr...
PKI (Public Key Infrastructure) is fundamental for many security applications on the network. Howeve...
The use of insecure networks -such as the Internet- to send and receive information has made the nee...
This paper provides a review of the current state of the art in standards for Public Key Infrastruct...
The use of insecure networks -such as the Internet- to send and receive information has made the nee...
Part 1: WISE 8International audienceThere exist many obstacles that slow the global adoption of publ...
The Internet has opened new ways of communication between individuals, organisations and businesses....
Public-key cryptography is fast becoming the foundation for online commerce and other applications t...
Includes bibliographical references (page 31).Security for electronic commerce has become increasing...
This paper describes a flexible and general purpose PKI platform providing an easily interoperable s...
It has been conventional wisdom that, for e-commerce to fulfil its potential, each party to a transa...
Security mechanisms can only be effective if they are usable as well. Above all, this statement appl...
Security mechanisms can only be effective if they are usable as well. Above all, this statement appl...
This paper describes Public Key Infrastructure (PKI). It is a platform for the realization of secure...
Abstract. In this paper we consider how practical interoperation between a conventional PKI and an i...
In an organization with its own Private Network , it is not just enough to transfer the documents fr...
PKI (Public Key Infrastructure) is fundamental for many security applications on the network. Howeve...
The use of insecure networks -such as the Internet- to send and receive information has made the nee...
This paper provides a review of the current state of the art in standards for Public Key Infrastruct...
The use of insecure networks -such as the Internet- to send and receive information has made the nee...
Part 1: WISE 8International audienceThere exist many obstacles that slow the global adoption of publ...
The Internet has opened new ways of communication between individuals, organisations and businesses....
Public-key cryptography is fast becoming the foundation for online commerce and other applications t...
Includes bibliographical references (page 31).Security for electronic commerce has become increasing...
This paper describes a flexible and general purpose PKI platform providing an easily interoperable s...
It has been conventional wisdom that, for e-commerce to fulfil its potential, each party to a transa...
Security mechanisms can only be effective if they are usable as well. Above all, this statement appl...
Security mechanisms can only be effective if they are usable as well. Above all, this statement appl...
This paper describes Public Key Infrastructure (PKI). It is a platform for the realization of secure...
Abstract. In this paper we consider how practical interoperation between a conventional PKI and an i...
In an organization with its own Private Network , it is not just enough to transfer the documents fr...