close menu
Bookswagon-24x7 online bookstore
close menu
My Account
Understanding PKI: Concepts, Standards, and Deployment Considerations(Kaleidoscope)

Understanding PKI: Concepts, Standards, and Deployment Considerations(Kaleidoscope)

3.3       |  3 Reviews 
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

Public-Key Infrastructure (PKI) is the foundation of the four major elements of digital security: authentication, integrity, confidentiality, and non-repudiation. The idea of a public-key infrastructure has existed for more than a decade, but the need for PKI has intensified over the last few years as the Internet has expanded its reach into business, government, the legal system, the military, and other areas that depend on secure communications. Understanding PKI, Second Edition, is both a guide for software engineers involved in PKI development and a readable resource for technical managers responsible for their organization ;s security policies and investments. It is a comprehensive primer to the latest in PKI technology and how it is used today. Taking a non-vendor-specific approach, this book explains fundamental concepts, examines emerging standards, and discusses deployment considerations and strategies that effect success.This second edition has been updated throughout to incorporate all of the most recent developments in the PKI field. Two new chapters have been added to address the use of PKI in the real world and to explore the technology ;s future. This new edition also addresses:The X.509 standardPKI for privacyThe emergence of electronic signatures and accompanying legislationNew PKI initiatives supported by the XML standards bodiesIn addition to this specific information, the authors lend their informed opinions on how emerging trends will drive the expansion of PKI. 0672323915B10162002

Table of Contents:
Foreword. Preface. About the Authors. I. CONCEPTS. 1. Introduction. 2. Public-Key Cryptography. Symmetric versus Asymmetric Ciphers. Secret Key. New Directions: Public Key. Public/Private-Key Pair. Services of Public-Key Cryptography. Security between Strangers. Encryption. Digital Signature. Data Integrity. Key Establishment. Other Services. Algorithms. RSA. DSA. DH. ECDSA and ECDH. SHA-1. Ongoing Work. Summary. 3. The Concept of an Infrastructure. Pervasive Substrate. Application Enabler. Secure Sign-On. End-User Transparency. Comprehensive Security. Business Drivers. Public-Key Infrastructure Defined. Certification Authority. Certificate Repository. Certificate Revocation. Key Backup and Recovery. Automatic Key Update. Key History. Cross-Certification. Support for Non-repudiation. Time Stamping. Client Software. Summary. 4. Core PKI Services: Authentication, Integrity, and Confidentiality. Definitions. Authentication. Integrity. Confidentiality. Mechanisms. Authentication. Integrity. Confidentiality. Operational Considerations. Performance. Online versus Offline Operation. Commonality of Underlying Algorithms. Entity Naming. Summary. 5. PKI-Enabled Services. Secure Communication. Secure Time Stamping. Notarization. Non-repudiation. Connection with Other Services. Need for Secure Data Archive. Complexity of This Service. The Human Factor. Privilege Management. Authentication and Authorization. Authorization Authorities. Delegation. Connection with the PKI. Privacy. Mechanisms Required to Create PKI-Enabled Services. Digital Signatures, Hashes, MACs, and Ciphers. Trusted Time Sources. Privilege Policy Creation Mechanism. Privilege Policy Processing Engines. Privilege Management Infrastructure Mechanisms. Privacy Architecture. Operational Considerations. Trusted Time Delivery Mechanism. Secure Protocols. Server Redundancy. Physically Secure Archive Facilities. Privacy Certificates and Identity Mapping. Real Life. Comprehensive PKI and Current Practice. Summary. 6. Certificates and Certification. Certificates. Digital Certificate. Certificate Structure and Semantics. Alternative Certificate Formats. Certificate Policies. Object Identifiers. Policy Authorities. Certification Authority. Registration Authority. Summary. 7. Key and Certificate Management. Key/Certificate Life-Cycle Management. Initialization Phase. Issued Phase. Cancellation Phase. Summary. 8. Certificate Revocation. Periodic Publication Mechanisms. Certificate Revocation Lists (CRLs). Complete CRLs. Certification Authority Revocation Lists (CARLs). End-Entity Public-Key Certification Revocation Lists (EPRLs). CRL Distribution Points. Redirect CRLs. Delta and Indirect Delta CRLs. Indirect CRLs. Certificate Revocation Trees (CRTs). Online Query Mechanisms. Online Certificate Status Protocol (OCSP). Simple Certificate Validation Protocol (SCVP). Other Revocation Options. Performance, Scalability, and Timeliness. Summary. 9. Trust Models. Strict Hierarchy of Certification Authorities. Loose Hierarchy of Certification Authorities. Policy-Based Hierarchies. Distributed Trust Architecture. Mesh Configuration. Hub-and-Spoke Configuration. Four-Corner Trust Model. Web Model. User-Centric Trust. Cross-Certification. Entity Naming. Certificate Path Processing. Path Construction. Path Validation. Trust Anchor Considerations. Summary. 10. Multiple Certificates per Entity. Multiple Key Pairs. Key Pair Uses. Relationship between Key Pairs and Certificates. Real-World Difficulties. Independent Certificate Management. Support for Non-repudiation. Summary. 11. PKI Information Dissemination: Repositories and Other Techniques. Private Dissemination. Publication and Repositories. Locating Repositories 162Tradeoffs. Interdomain Repository Issues and Options. Direct Access. Border Repository. Shared Repository. Interdomain Replication. In-band Protocol Exchange. Summary. 12. PKI Operational Considerations. Client-Side Software. Off-line Operations. Physical Security. Hardware Components. User Key Compromise. Disaster Preparation and Recovery. Relying Party Notification. Preparation. Recovery. Additional Observations. Summary. 13. Electronic Signature Legislation and Considerations. Electronic Signature Legislation. E-Sign. Digital Signatures in Context. EU Electronic Signature Directive. The Significance of Electronic Signature Initiatives. Legal Considerations for PKIs. CA Requirements. Roles and Responsibilities. Private Enterprise PKIs. Other Contractual-Based Frameworks. Confidentiality. Summary. 14. PKI in Practice. What PKI Does. What PKI Does Not Do. The Value of PKI. When Certificates and People Meet. An E-mail Scenario. A Web Scenario. Summary. 15. The Future of PKI. What Happened? How the World Is Changing. A Recognized Authoritative Body. A Motivation. Users. Reasons for Cautious Optimism. Summary. 16. Conclusions and Further Reading. Conclusions. Suggestions for Further Reading. II. STANDARDS. 17. Introduction. 18. Major Standards Activities. X.509. PKIX. X.500. LDAP. ISO TC68. ANSI X9F. S/MIME. IPsec. TLS. SPKI. OpenPGP. EDIFACT. IEEE. WAP. XML-Based Activities. Other Activities. U.S. FPKI. MISPC. GOC PKI. SET. SEMPER. ECOM. JCP. ICE-CAR. Summary. 19. Standardization Status and Road Map. Current Standardization Status. X.509. PKIX. X.500. LDAP. S/MIME. IPsec. TLS. Toolkit Requirements (APIs and Mechanisms). Others. Ongoing Standardization Work. Summary. 20. Standards: Necessary but Not Sufficient. The Role of Standards, Profiles, and Interoperability Testing. Profiles and Interoperability Testing. Interoperability Initiatives. Automotive Network eXchange. Bridge CA Demonstration. Federal PKI. Minimum Interoperability Specification. National Automated Clearing House Association. PKI X.509. Securities Industry Root CA Proof of Concept. EEMA PKI Challenge. Summary. 21. Conclusions and Further Reading. Conclusions. Suggestions for Further Reading. Certificate/CRL Syntax and Life-Cycle Management Protocols. Certificate/CRL Storage and Retrieval. XML-Based Initiatives. Interoperability Initiatives. Standards Bodies' Web Sites. Books. III. DEPLOYMENT CONSIDERATIONS. 22. Introduction. 23. Benefits and Costs of a PKI. Business Case Considerations. Cost Considerations. Deployment: Now or Later? Summary. 24. Deployment Issues and Decisions. Trust Models: Hierarchical versus Distributed. In-sourcing versus Out-sourcing. Build versus Buy. Closed versus Open Environment. X.509 versus Alternative Certificate Formats. Targeted Applications versus Comprehensive Solution. Standard versus Proprietary Solutions. Interoperability Considerations. Certificate and CRL Profiles. Multiple Industry-Accepted Standards. PKI-Enabled Applications. Policy/Business Control Issues. On-line versus Off-line Operations. Peripheral Support. Facility Requirements. Personnel Requirements. Certificate Revocation. End-Entity Roaming. Key Recovery. Repository Issues. Disaster Planning and Recovery. Security Assurance. Mitigating Risk. Summary. 25. Barriers to Deployment. Repository Issues. Lack of Industry-Accepted Standard. Multivendor Interoperability. Scalability and Performance. Knowledgeable Personnel. PKI-Enabled Applications. Corporate-Level Acceptance. Summary. 26. Typical Business Models. Internal Communications Business Model. External Communications Business Model. Business-to-Business Communication. Business-to-Consumer Communication. Internal/External Business Model Hybrids. Business Model Influences. Government-Sponsored Initiatives. Interdomain Trust. Identrus. Bridge CA. VeriSign Trust Network. GTE CyberTrust/Baltimore Technologies OmniRoot. Other Trust Networks. Summary. 27. Conclusions and Further Reading. Conclusions. Suggestions for Further Reading. References. Index. 0672323915T10162002


Best Seller

| | See All

Product Details
  • ISBN-13: 9780672323911
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Addison-Wesley Educational Publishers Inc
  • Depth: 19
  • Height: 244 mm
  • No of Pages: 352
  • Spine Width: 21 mm
  • Weight: 744 gr
  • ISBN-10: 0672323915
  • Publisher Date: 15 Nov 2002
  • Binding: Hardback
  • Edition: 2 SUB
  • Language: English
  • Series Title: Kaleidoscope
  • Sub Title: Concepts, Standards, and Deployment Considerations
  • Width: 193 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

3.3       |  3 Reviews 
out of (%) reviewers recommend this product
Top Reviews
Rating Snapshot
Select a row below to filter reviews.
5
4
3
2
1
Average Customer Ratings
3.3       |  3 Reviews 
00 of 0 Reviews
Sort by :
Active Filters

00 of 0 Reviews
SEARCH RESULTS
1–2 of 2 Reviews
    BoxerLover2 - 5 Days ago
    A Thrilling But Totally Believable Murder Mystery

    Read this in one evening. I had planned to do other things with my day, but it was impossible to put down. Every time I tried, I was drawn back to it in less than 5 minutes. I sobbed my eyes out the entire last 100 pages. Highly recommend!

    BoxerLover2 - 5 Days ago
    A Thrilling But Totally Believable Murder Mystery

    Read this in one evening. I had planned to do other things with my day, but it was impossible to put down. Every time I tried, I was drawn back to it in less than 5 minutes. I sobbed my eyes out the entire last 100 pages. Highly recommend!


Sample text
Photo of
    Media Viewer

    Sample text
    Reviews
    Reader Type:
    BoxerLover2
    00 of 0 review

    Your review was submitted!
    Understanding PKI: Concepts, Standards, and Deployment Considerations(Kaleidoscope)
    Pearson Education (US) -
    Understanding PKI: Concepts, Standards, and Deployment Considerations(Kaleidoscope)
    Writing guidlines
    We want to publish your review, so please:
    • keep your review on the product. Review's that defame author's character will be rejected.
    • Keep your review focused on the product.
    • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
    • Refrain from mentioning competitors or the specific price you paid for the product.
    • Do not include any personally identifiable information, such as full names.

    Understanding PKI: Concepts, Standards, and Deployment Considerations(Kaleidoscope)

    Required fields are marked with *

    Review Title*
    Review
      Add Photo Add up to 6 photos
      Would you recommend this product to a friend?
      Tag this Book
      Read more
      Does your review contain spoilers?
      What type of reader best describes you?
      I agree to the terms & conditions
      You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

      CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

      These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


      By submitting any content to Bookswagon, you guarantee that:
      • You are the sole author and owner of the intellectual property rights in the content;
      • All "moral rights" that you may have in such content have been voluntarily waived by you;
      • All content that you post is accurate;
      • You are at least 13 years old;
      • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
      You further agree that you may not submit any content:
      • That is known by you to be false, inaccurate or misleading;
      • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
      • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
      • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
      • For which you were compensated or granted any consideration by any unapproved third party;
      • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
      • That contains any computer viruses, worms or other potentially damaging computer programs or files.
      You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


      For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


      All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

      Accept

      New Arrivals

      | | See All


      Inspired by your browsing history


      Your review has been submitted!

      You've already reviewed this product!
      ASK VIDYA