Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure
Buy Rights Online Buy Rights

Rights Contact Login For More Details

More About This Title Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure

English

An in-depth technical guide on the security technology driving Internet e-commerce expansion.
"Planning for PKI" examines the number-one Internet security technology that will be widely adopted in the next two years. Written by two of the architects of the Internet PKI standards, this book provides authoritative technical guidance for network engineers, architects, and managers who need to implement the right PKI architecture for their organization. The authors discuss results and lessons learned from early PKI pilots, helping readers evaluate PKI deployment impact on current network architecture while avoiding the pitfalls of early technical mistakes. Four technical case studies detail the do's and don'ts of PKI implementation, illustrating both successes and failures of different deployments. Readers will also learn how to leverage future PKI-related technologies for additional benefits.

English

RUSS HOUSLEY is Chief Scientist for SPYRUS, a leading provider of security products. He has contributed to the development of many standards, including PKIX Part 1, S/MIME, and MSP, the security cornerstone of the U.S. Defense Message System. He is a member of the President's Export Council Subcommittee on Encryption, and chair of the IETF S/MIME Working Group.
TIM POLK is the technical lead for PKI at the National Institute of Standards and Technology (NIST). He has participated in federal PKI projects, such as the Federal Bridge CA project, since 1995. He has contributed to the development of many standards including PKIX Part 1. He is currently the co-chair of the IETF PKIX Working Group.

English

Foreword.

Acknowledgments.

Introduction.

Cryptography Primer.

PKI Basics.

Authentication Mechanisms.

PKI Components and Users.

PKI Architectures.

X.509 Public Key Certificates.

Certificate Revocation Lists.

Repository Protocols.

Building and Validating Certification Paths.

PKI Management Protocols.

Policies, Procedures, and PKI.

PKI-Enabled Applications.

Defense Message System 1.0.

California Independent Service Operator.

The Federal Bridge CA Project.

Future Developments.

Appendix A: ASN.1 Primer.

Appendix B: Object Identifiers.

Bibliography.

Index.

English

"Rather than being an abstract academic text, the authors, Russ Housley and Tim Polk, write from years of practical experience. Housley is the Chief Scientist for Spyrus, and Polk is the technical lead for PKI at NIST. At a little over 300 pages, Planning for PKI is a valuable reference to the workings of PKI."
--Ben Rothke; UnixReview.com (5/7/01)
loading