Understanding PKI
Home > Computing and Information Technology > Computer networking and communications > Network security > Understanding PKI: Concepts, Standards, and Deployment Considerations
Understanding PKI: Concepts, Standards, and Deployment Considerations

Understanding PKI: Concepts, Standards, and Deployment Considerations

|
     0     
5
4
3
2
1




Out of Stock


Notify me when this book is in stock
About the Book

PKI (public-key infrastructure) enables the secure exchange of data over otherwise unsecured media, such as the Internet. PKI is the underlying cryptographic security mechanism for digital certificates and certificate directories, which are used to authenticate a message sender. Because PKI is the standard for authenticating commercial electronic transactions, Understanding PKI, Second Edition, provides network and security architects with the tools they need to grasp each phase of the key/certificate life cycle, including generation, publication, deployment, and recovery.

Table of Contents:
Foreword. Preface. About the Authors. I. CONCEPTS. 1. Introduction. 2. Public-Key Cryptography. Symmetric versus Asymmetric Ciphers. Secret Key. New Directions: Public Key. Public/Private-Key Pair. Services of Public-Key Cryptography. Security between Strangers. Encryption. Digital Signature. Data Integrity. Key Establishment. Other Services. Algorithms. RSA. DSA. DH. ECDSA and ECDH. SHA-1. Ongoing Work. Summary. 3. The Concept of an Infrastructure. Pervasive Substrate. Application Enabler. Secure Sign-On. End-User Transparency. Comprehensive Security. Business Drivers. Public-Key Infrastructure Defined. Certification Authority. Certificate Repository. Certificate Revocation. Key Backup and Recovery. Automatic Key Update. Key History. Cross-Certification. Support for Non-repudiation. Time Stamping. Client Software. Summary. 4. Core PKI Services: Authentication, Integrity, and Confidentiality. Definitions. Authentication. Integrity. Confidentiality. Mechanisms. Authentication. Integrity. Confidentiality. Operational Considerations. Performance. Online versus Offline Operation. Commonality of Underlying Algorithms. Entity Naming. Summary. 5. PKI-Enabled Services. Secure Communication. Secure Time Stamping. Notarization. Non-repudiation. Connection with Other Services. Need for Secure Data Archive. Complexity of This Service. The Human Factor. Privilege Management. Authentication and Authorization. Authorization Authorities. Delegation. Connection with the PKI. Privacy. Mechanisms Required to Create PKI-Enabled Services. Digital Signatures, Hashes, MACs, and Ciphers. Trusted Time Sources. Privilege Policy Creation Mechanism. Privilege Policy Processing Engines. Privilege Management Infrastructure Mechanisms. Privacy Architecture. Operational Considerations. Trusted Time Delivery Mechanism. Secure Protocols. Server Redundancy. Physically Secure Archive Facilities. Privacy Certificates and Identity Mapping. Real Life. Comprehensive PKI and Current Practice. Summary. 6. Certificates and Certification. Certificates. Digital Certificate. Certificate Structure and Semantics. Alternative Certificate Formats. Certificate Policies. Object Identifiers. Policy Authorities. Certification Authority. Registration Authority. Summary. 7. Key and Certificate Management. Key/Certificate Life-Cycle Management. Initialization Phase. Issued Phase. Cancellation Phase. Summary. 8. Certificate Revocation. Periodic Publication Mechanisms. Certificate Revocation Lists (CRLs). Complete CRLs. Certification Authority Revocation Lists (CARLs). End-Entity Public-Key Certification Revocation Lists (EPRLs). CRL Distribution Points. Redirect CRLs. Delta and Indirect Delta CRLs. Indirect CRLs. Certificate Revocation Trees (CRTs). Online Query Mechanisms. Online Certificate Status Protocol (OCSP). Simple Certificate Validation Protocol (SCVP). Other Revocation Options. Performance, Scalability, and Timeliness. Summary. 9. Trust Models. Strict Hierarchy of Certification Authorities. Loose Hierarchy of Certification Authorities. Policy-Based Hierarchies. Distributed Trust Architecture. Mesh Configuration. Hub-and-Spoke Configuration. Four-Corner Trust Model. Web Model. User-Centric Trust. Cross-Certification. Entity Naming. Certificate Path Processing. Path Construction. Path Validation. Trust Anchor Considerations. Summary. 10. Multiple Certificates per Entity. Multiple Key Pairs. Key Pair Uses. Relationship between Key Pairs and Certificates. Real-World Difficulties. Independent Certificate Management. Support for Non-repudiation. Summary. 11. PKI Information Dissemination: Repositories and Other Techniques. Private Dissemination. Publication and Repositories. Locating Repositories 162Tradeoffs. Interdomain Repository Issues and Options. Direct Access. Border Repository. Shared Repository. Interdomain Replication. In-band Protocol Exchange. Summary. 12. PKI Operational Considerations. Client-Side Software. Off-line Operations. Physical Security. Hardware Components. User Key Compromise. Disaster Preparation and Recovery. Relying Party Notification. Preparation. Recovery. Additional Observations. Summary. 13. Electronic Signature Legislation and Considerations. Electronic Signature Legislation. E-Sign. Digital Signatures in Context. EU Electronic Signature Directive. The Significance of Electronic Signature Initiatives. Legal Considerations for PKIs. CA Requirements. Roles and Responsibilities. Private Enterprise PKIs. Other Contractual-Based Frameworks. Confidentiality. Summary. 14. PKI in Practice. What PKI Does. What PKI Does Not Do. The Value of PKI. When Certificates and People Meet. An E-mail Scenario. A Web Scenario. Summary. 15. The Future of PKI. What Happened? How the World Is Changing. A Recognized Authoritative Body. A Motivation. Users. Reasons for Cautious Optimism. Summary. 16. Conclusions and Further Reading. Conclusions. Suggestions for Further Reading. II. STANDARDS. 17. Introduction. 18. Major Standards Activities. X.509. PKIX. X.500. LDAP. ISO TC68. ANSI X9F. S/MIME. IPsec. TLS. SPKI. OpenPGP. EDIFACT. IEEE. WAP. XML-Based Activities. Other Activities. U.S. FPKI. MISPC. GOC PKI. SET. SEMPER. ECOM. JCP. ICE-CAR. Summary. 19. Standardization Status and Road Map. Current Standardization Status. X.509. PKIX. X.500. LDAP. S/MIME. IPsec. TLS. Toolkit Requirements (APIs and Mechanisms). Others. Ongoing Standardization Work. Summary. 20. Standards: Necessary but Not Sufficient. The Role of Standards, Profiles, and Interoperability Testing. Profiles and Interoperability Testing. Interoperability Initiatives. Automotive Network eXchange. Bridge CA Demonstration. Federal PKI. Minimum Interoperability Specification. National Automated Clearing House Association. PKI X.509. Securities Industry Root CA Proof of Concept. EEMA PKI Challenge. Summary. 21. Conclusions and Further Reading. Conclusions. Suggestions for Further Reading. Certificate/CRL Syntax and Life-Cycle Management Protocols. Certificate/CRL Storage and Retrieval. XML-Based Initiatives. Interoperability Initiatives. Standards Bodies' Web Sites. Books. III. DEPLOYMENT CONSIDERATIONS. 22. Introduction. 23. Benefits and Costs of a PKI. Business Case Considerations. Cost Considerations. Deployment: Now or Later? Summary. 24. Deployment Issues and Decisions. Trust Models: Hierarchical versus Distributed. In-sourcing versus Out-sourcing. Build versus Buy. Closed versus Open Environment. X.509 versus Alternative Certificate Formats. Targeted Applications versus Comprehensive Solution. Standard versus Proprietary Solutions. Interoperability Considerations. Certificate and CRL Profiles. Multiple Industry-Accepted Standards. PKI-Enabled Applications. Policy/Business Control Issues. On-line versus Off-line Operations. Peripheral Support. Facility Requirements. Personnel Requirements. Certificate Revocation. End-Entity Roaming. Key Recovery. Repository Issues. Disaster Planning and Recovery. Security Assurance. Mitigating Risk. Summary. 25. Barriers to Deployment. Repository Issues. Lack of Industry-Accepted Standard. Multivendor Interoperability. Scalability and Performance. Knowledgeable Personnel. PKI-Enabled Applications. Corporate-Level Acceptance. Summary. 26. Typical Business Models. Internal Communications Business Model. External Communications Business Model. Business-to-Business Communication. Business-to-Consumer Communication. Internal/External Business Model Hybrids. Business Model Influences. Government-Sponsored Initiatives. Interdomain Trust. Identrus. Bridge CA. VeriSign Trust Network. GTE CyberTrust/Baltimore Technologies OmniRoot. Other Trust Networks. Summary. 27. Conclusions and Further Reading. Conclusions. Suggestions for Further Reading. References. Index. 0672323915T10162002


Best Sellers


Product Details
  • ISBN-13: 9780672323911
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Addison-Wesley Educational Publishers Inc
  • Height: 244 mm
  • No of Pages: 352
  • Sub Title: Concepts, Standards, and Deployment Considerations
  • Width: 193 mm
  • ISBN-10: 0672323915
  • Publisher Date: 15 Nov 2002
  • Binding: Hardback
  • Language: English
  • Spine Width: 21 mm
  • Weight: 744 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Understanding PKI: Concepts, Standards, and Deployment Considerations
Pearson Education (US) -
Understanding PKI: Concepts, Standards, and Deployment Considerations
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Understanding PKI: Concepts, Standards, and Deployment Considerations

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!