DocumentCode
1483544
Title
Public key infrastructure. How it works
Author
Younglove, Roger W.
Author_Institution
NetworkCare Security Services, Southfield, MI, USA
Volume
12
Issue
2
fYear
2001
fDate
4/1/2001 12:00:00 AM
Firstpage
99
Lastpage
102
Abstract
A variety of authentication methods to verify the identity of valid users can be implemented with IPSec (IP security), including shared secret, token cards and digital certificates. For a large extranet implementation, the easiest method is public key infrastructure (PKI) using digital certificates. This article gives telecommunications managers, network planners and engineers a more detailed look at how PKI works in a virtual private network (VPN) environment.
Keywords
authorisation; certification; computer network management; public key cryptography; telecommunication security; transport protocols; IP security; IPSec; Internet Protocol; authentication methods; digital certificates; extranet implementation; network planning; public key infrastructure; shared secret; telecommunications engineering; telecommunications management; token cards; valid user identity verification; virtual private network;
fLanguage
English
Journal_Title
Computing & Control Engineering Journal
Publisher
iet
ISSN
0956-3385
Type
jour
DOI
10.1049/cce:20010211
Filename
920643
Link To Document