DocumentCode :
1483544
Title :
Public key infrastructure. How it works
Author :
Younglove, Roger W.
Author_Institution :
NetworkCare Security Services, Southfield, MI, USA
Volume :
12
Issue :
2
fYear :
2001
fDate :
4/1/2001 12:00:00 AM
Firstpage :
99
Lastpage :
102
Abstract :
A variety of authentication methods to verify the identity of valid users can be implemented with IPSec (IP security), including shared secret, token cards and digital certificates. For a large extranet implementation, the easiest method is public key infrastructure (PKI) using digital certificates. This article gives telecommunications managers, network planners and engineers a more detailed look at how PKI works in a virtual private network (VPN) environment.
Keywords :
authorisation; certification; computer network management; public key cryptography; telecommunication security; transport protocols; IP security; IPSec; Internet Protocol; authentication methods; digital certificates; extranet implementation; network planning; public key infrastructure; shared secret; telecommunications engineering; telecommunications management; token cards; valid user identity verification; virtual private network;
fLanguage :
English
Journal_Title :
Computing & Control Engineering Journal
Publisher :
iet
ISSN :
0956-3385
Type :
jour
DOI :
10.1049/cce:20010211
Filename :
920643
Link To Document :
بازگشت