Frontiers in artificial intelligence and applications ;
Volume Designation
v. 128
INTERNAL BIBLIOGRAPHIES/INDEXES NOTE
Text of Note
Includes bibliographical references and author index.
CONTENTS NOTE
Text of Note
Title page; Preface; Program Committee; Contents; PKI Operation & Case Study; Non-Repudiation; Authorization & Access Control; Authentication & Time-Stamping; Certificate Validation & Revocation; Cryptographic Applications; Author Index.
0
SUMMARY OR ABSTRACT
Text of Note
Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, in which many organizations are now leveraging it as part of their core infrastructure system for providing and building security in their businesses. Understanding the challenges and requirements of PKI related operations through the sharing of case studies are critical to supporting the continued research and development of PKI technologies and related systems and appliations to further progress and innovate for enhancing future development and evolution of PKI in the enterprises. This publication includes topics such as: PKI Operation & Case Study; Non-repudiation; Authorization & Access Control, Authentication & Time-tamping, Certificate Validation & Revocation and Cryptographic Applications.
SYSTEM REQUIREMENTS NOTE (ELECTRONIC RESOURCES)
Text of Note
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
ACQUISITION INFORMATION NOTE
Source for Acquisition/Subscription Address
IOS Press
Stock Number
978-1-58603-550-1
OTHER EDITION IN ANOTHER MEDIUM
Title
Applied public key infrastructure.
PARALLEL TITLE PROPER
Parallel Title
IWAP 2005
TOPICAL NAME USED AS SUBJECT
Public key cryptography, Congresses.
Public key infrastructure (Computer security), Congresses.
COMPUTERS-- Security-- Cryptography.
Public key cryptography.
Public key infrastructure (Computer security)
(SUBJECT CATEGORY (Provisional
COM-- COM004000
K
DEWEY DECIMAL CLASSIFICATION
Number
005
.
8/2
Edition
22
LIBRARY OF CONGRESS CLASSIFICATION
Class number
QA76
.
9
.
A25
Book number
I558
2005eb
PERSONAL NAME - ALTERNATIVE RESPONSIBILITY
Zhou, Jianying.
CORPORATE BODY NAME - PRIMARY RESPONSIBILITY
International Workshop for Applied PKI(4th :2005 :, Singapore)