INTERNET SECURITY: PUBLIC-KEY INFRASTRACTURES AND CERTIFICATION SYSTEMS

Ben Soh, Luke Sledziona

Abstract

In the current business environment there is an ever growing view of the World Wide Web, commonly referred to as the Internet, as the new frontier for electronic commerce or e-commerce. As a result many businesses are developing applications and/or websites in order to conduct e-commerce on the Internet without properly considering the implications of the certification system that they are choosing to use, if they use one at all. The aim of this paper is to present work in the area of public key infrastructures and certification systems by discussing important topics pertaining to this area of research. The security needs of businesses will be initially discussed as an introduction to certification systems. This leads into the discussions of X.509 public key infrastructures and certificate revocation, where the associated problems will be discussed.

References

  1. Lareau P., Schulz B., “PKI Basics - A Business Perspective,” PKI forum, PKI Note, April 2002, http://www.pkiforum.org/pdfs/PKI_BasicsA_business_perspective.pdf.
  2. Diffie W., Hellman M., “New Directions in Cryptography”, IEEE Transactions on Information Theory 22, 1974, pp 644-654.
  3. ITU-T X.509 Recommendation, “Information Technology - Open Systems Interconnection - The Directory Public Key and Attribute Certificate Frameworks”, ISO/IEC 9594-8 2000, June 2000
  4. Clarke R., “Public Key Infrastructure Position Statement,” Australian National University, Department of Computer Science, Canberra, Australia, May 1998, http://www.anu.edu.au/people/Roger.Clarke/DV/PKIP osn.html
  5. Adams C. et all., “Which PKI (public key infrastructure) is the right one?,” in Proceedings of the 7th ACM conference on Computer and communications security, Athens, Greece, 2000, pp 98-101.
  6. Adams C., Lloyd S., “Profiles and Protocols for the Internet Public-Key Infrastructure,” in Proceedings of the Sixth IEEE Computer Society Workshop on Future Trends, October 1997, pp 220-224.
Download


Paper Citation


in Harvard Style

Soh B. and Sledziona L. (2004). INTERNET SECURITY: PUBLIC-KEY INFRASTRACTURES AND CERTIFICATION SYSTEMS . In Proceedings of the First International Conference on E-Business and Telecommunication Networks - Volume 2: ICETE, ISBN 972-8865-15-5, pages 93-98. DOI: 10.5220/0001387900930098


in Bibtex Style

@conference{icete04,
author={Ben Soh and Luke Sledziona},
title={INTERNET SECURITY: PUBLIC-KEY INFRASTRACTURES AND CERTIFICATION SYSTEMS},
booktitle={Proceedings of the First International Conference on E-Business and Telecommunication Networks - Volume 2: ICETE,},
year={2004},
pages={93-98},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001387900930098},
isbn={972-8865-15-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the First International Conference on E-Business and Telecommunication Networks - Volume 2: ICETE,
TI - INTERNET SECURITY: PUBLIC-KEY INFRASTRACTURES AND CERTIFICATION SYSTEMS
SN - 972-8865-15-5
AU - Soh B.
AU - Sledziona L.
PY - 2004
SP - 93
EP - 98
DO - 10.5220/0001387900930098