Public key infrastructures that satisfy security goals

WT Polk, NE Hastings, A Malpani - IEEE Internet Computing, 2003 - search.proquest.com
WT Polk, NE Hastings, A Malpani
IEEE Internet Computing, 2003search.proquest.com
The architecture chosen for a public key infrastructure (PKI) determines the scalability and
usability experienced by PKI users. Enterprise PKIs typically consist of a single certificate
authority (CA) or small hierarchy of CAs along with a single directory system. These
enterprise architectures have limited scalability, but simplify PKI client implementations. As
enterprises seek to link their PKIs to support security services across organizational
boundaries, networks of CAs and PKIs, based on the bridge CA concept, are emerging. A …
Abstract
The architecture chosen for a public key infrastructure (PKI) determines the scalability and usability experienced by PKI users. Enterprise PKIs typically consist of a single certificate authority (CA) or small hierarchy of CAs along with a single directory system. These enterprise architectures have limited scalability, but simplify PKI client implementations. As enterprises seek to link their PKIs to support security services across organizational boundaries, networks of CAs and PKIs, based on the bridge CA concept, are emerging. A new PKI component, the validation authority, has been introduced to simplify the interface to today's complex PKIs. This article provides a guide to PKI architecture that satisfies an organization's security goals.
ProQuest
以上显示的是最相近的搜索结果。 查看全部搜索结果