Applied Public Key Infrastructure

4th International Workshop: IWAP 2005

Share
Applied Public Key Infrastructure
Editors
Zhou, J., Kang, M.-C., Bao, F., Pang, H.-H.
Pub. date
September 2005
Pages
276
Binding
hardcover (second printing 2006)
Volume
128 of Frontiers in Artificial Intelligence and Applications
ISBN print
978-1-58603-550-1
ISBN online
978-1-60750-136-7
Subject
Artificial Intelligence, Computer & Communication Sciences
€99 / US$144 Excl. VAT
Order Applied Public Key Infrastructure ISBN @ €99.00
Order Ebook

Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, in which many organizations are now leveraging it as part of their core infrastructure system for providing and building security in their businesses. Understanding the challenges and requirements of PKI related operations through the sharing of case studies are critical to supporting the continued research and development of PKI technologies and related systems and applications to further progress and innovate for enhancing future development and evolution of PKI in the enterprises. This publication includes topics such as: PKI Operation & Case Study; Non-repudiation; Authorization & Access Control, Authentication & Time-Stamping, Certificate Validation & Revocation and Cryptographic Applications.