5. Implementing a PKI
Implementing a complete key management infrastructure is a major undertaking. Describing all the tasks involved is beyond the scope of this article; the book by J.G. DUMAS et al. provides a detailed review of the processes in its chapter "Services regulatory framework, certification policy and deployment". The description below is only a rough outline of the tasks involved.
We will consider two cases:
Do we want to implement all the services of a PKI for our own...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Implementing a PKI
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
References
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!