1 / 375
文档名称:

Addison Wesley - Understanding Pki - Concepts, Standards, Deployment And Considerations (2Nd Ed).pdf

格式:pdf   页数:375
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

Addison Wesley - Understanding Pki - Concepts, Standards, Deployment And Considerations (2Nd Ed).pdf

上传人:bolee65 2014/8/7 文件大小:0 KB

下载得到文件列表

Addison Wesley - Understanding Pki - Concepts, Standards, Deployment And Considerations (2Nd Ed).pdf

文档介绍

文档介绍:This document is created with the unregistered version of CHM2PDF Pilot
I ******@ve RuBoard
• Table of Contents
Understanding PKI: Concepts, Standards, and Deployment
Considerations, Second Edition
By Carlisle Adams, Steve Lloyd
Publisher : Addison Wesley
Pub Date : November 06, 2002
ISBN : 0-672-32391-5
Pages : 352
PKI (public-key infrastructure) enables the secure exchange of data over
otherwise unsecured media, such as the . PKI is the underlying
cryptographic security mechanism for digital certificates and certificate
directories, which are used to authenticate a message sender. Because PKI is
the standard for mercial electronic transactions,
Understanding PKI, Second Edition, work and security architects
with the tools they need to grasp each phase of the key/certificate life cycle,
including generation, publication, deployment, and recovery.
I ******@ve RuBoard
This document is created with the unregistered version of CHM2PDF Pilot
I ******@ve RuBoard
• Table of Contents
Understanding PKI: Concepts, Standards, and Deployment
Considerations, Second Edition
By Carlisle Adams, Steve Lloyd
Publisher : Addison Wesley
Pub Date : November 06, 2002
ISBN : 0-672-32391-5
Pages : 352
Copyright
Foreword
Preface
Motivations for PKI
Changes in the Second Edition
Audience
Organization
Part I: Concepts
Part II: Standards
Part III: Deployment Considerations
About the Authors
Part I: Concepts
Chapter 1. Introduction
This document is created with the unregistered version of CHM2PDF Pilot
Chapter 2. Public-Key Cryptography
Symmetric versus Asymmetric Ciphers
Public/Private-Key Pair
Services of Public-Key Cryptography
Algorithms
Summary
Chapter 3. The Concept of an Infrastructure
Pervasive Substrate
Application Enabler
Business Drivers
Public-Key Infrastructure Defined
Summary
Chapter 4. Core PKI Services: Authentication, Integrity, and Confidentiality
Definitions
Mechanisms
Operatio