MTU Cork Library Catalogue

Syndetics cover image
Image from Syndetics

Understanding public-key infrastructure : concepts, standards, and deployment considerations / Carlisle Adams, Steve Lloyd.

By: Adams, Carlisle, 1961-.
Contributor(s): Lloyd, Steve.
Material type: materialTypeLabelBookSeries: Macmillan technology series: Publisher: Indianapolis : Macmillan Technical, 1999Description: 296 p. : ill. ; 24 cm + hbk.ISBN: 157870166X.Subject(s): Computer security | Computer networks -- Security measures | Business enterprises -- Computer networks -- Security measuresDDC classification: 658.478
Contents:
Introduction -- Part I: Concepts -- Introduction -- Public-Key cryptography -- The concept of an infrastructure -- Core PKI services: Authentication, integrity and confidentiality -- PKI-Enabled services -- Certificates and certification -- Key and certificate management -- Certificate revocation -- Trust models -- Multiple certificates per entity -- PKI information dissemination: Repositories and other techniques -- PKI operational considerations -- Legal framework -- Part II: Standards -- Introduction -- Major standards activities -- Standardization status and road map -- Standards: Necessary but not sufficient -- Part III: Deployment considerations -- Introduction -- Benefits (and Costs) of a PKI -- Deployment issues and decisions -- Barriers to deployment -- Typical business models.
Holdings
Item type Current library Call number Copy number Status Date due Barcode Item holds
General Lending MTU Bishopstown Library Lending 658.478 (Browse shelf(Opens below)) 1 Available 00080381
Total holds: 0

Enhanced descriptions from Syndetics:

This book is a tutorial on, and a guide to the deployment of, Public-Key Infrastructures. It covers a broad range of material related to PKIs, including certification, operational considerations and standardization efforts, as well as deployment issues and considerations. Emphasis is placed on explaining the interrelated fields within the topic area, to assist those who will be responsible for making deployment decisions and architecting a PKI within an organization.

Includes bibliographical references and index.

Introduction -- Part I: Concepts -- Introduction -- Public-Key cryptography -- The concept of an infrastructure -- Core PKI services: Authentication, integrity and confidentiality -- PKI-Enabled services -- Certificates and certification -- Key and certificate management -- Certificate revocation -- Trust models -- Multiple certificates per entity -- PKI information dissemination: Repositories and other techniques -- PKI operational considerations -- Legal framework -- Part II: Standards -- Introduction -- Major standards activities -- Standardization status and road map -- Standards: Necessary but not sufficient -- Part III: Deployment considerations -- Introduction -- Benefits (and Costs) of a PKI -- Deployment issues and decisions -- Barriers to deployment -- Typical business models.

Table of contents provided by Syndetics

  • Public-Key Cryptography
  • The Concept of an Infrastructure
  • Core PKI Services: Authentication, Integrity; and Confidentiality
  • PKI-Enabled Services
  • Certificates and Certification
  • Key and Certificate Management
  • Certificate Revocation
  • Trust Models
  • Multiple Certificates per Entity
  • PKI Information Dissemination: Repositories and Other Techniques
  • PKI Operational Considerations
  • Legal Frameworks
  • Major Standards Activity
  • Standardization Status and Road Map
  • Standards: Necessary, but Not Sufficient
  • Benefits and Costs of a PKI
  • Deployment Issues and Considerations
  • Barriers to Deployment
  • Typical Business Models.

Powered by Koha