4 - Public key infrastructure (PKI) systems
from II - E-system and network security tools
Published online by Cambridge University Press: 11 September 2009
Summary
Data that can be accessed on a network or that are transmitted on the network, from one edge node to another, must be protected from fraudulent modification and misdirection. Typically, information security systems require three main mechanisms to provide adequate levels of electronic mitigation: enablement, perimeter control, and intrusion detection and response. Enablement implies that a cohesive security plan has to be put in place with an infrastructure to support the execution of such a plan. The public key infrastructure (PKI) being discussed in this chapter falls under the first approach.
Introduction
One of the most decisive problems in business transaction is the identification of the principal (individual, software entity, or network entity) with which the transaction is being performed. As the traditional paperwork in business is moving to electronic transactions and digital documents, so must the reliance on traditional trust objects be converted to electronic trust, where security measures to authenticate electronic business actors, partners, and end-users before their involvement in the exchange of information, goods, and services are provided. Moreover, the obligation to provide confidentiality and confidence in the privacy of exchanged information is essential. Extending this list of security services should include the necessity to establish the non-repudiation of transactions, digitally attest the validity of transactions by trusted third parties, or securely time-stamping transactions.
- Type
- Chapter
- Information
- Security of e-Systems and Computer Networks , pp. 75 - 98Publisher: Cambridge University PressPrint publication year: 2007