Title :
Public key infrastructure. How it works
Author :
Younglove, Roger W.
Author_Institution :
NetworkCare Security Services, Southfield, MI, USA
fDate :
4/1/2001 12:00:00 AM
Abstract :
A variety of authentication methods to verify the identity of valid users can be implemented with IPSec (IP security), including shared secret, token cards and digital certificates. For a large extranet implementation, the easiest method is public key infrastructure (PKI) using digital certificates. This article gives telecommunications managers, network planners and engineers a more detailed look at how PKI works in a virtual private network (VPN) environment.
Keywords :
authorisation; certification; computer network management; public key cryptography; telecommunication security; transport protocols; IP security; IPSec; Internet Protocol; authentication methods; digital certificates; extranet implementation; network planning; public key infrastructure; shared secret; telecommunications engineering; telecommunications management; token cards; valid user identity verification; virtual private network;
Journal_Title :
Computing & Control Engineering Journal
DOI :
10.1049/cce:20010211