Limit search to available items
Book Cover
Book
Author Grant, Gail L.

Title Understanding digital signatures : establishing trust over the Internet and other networks / Gail L. Grant
Published New York : McGraw-Hill, [1998]
©1998

Copies

Location Call no. Vol. Availability
 W'BOOL  658.478 Gra/Uds  AVAILABLE
Description xv, 298 pages : illustrations ; 24 cm
Contents Copyrights and Trademarks xv -- Part 1 Background and Definition 1 -- Chapter 1 Background 3 -- E-mail and Customer Service 6 -- The World Wide Web 6 -- More than Billboards 8 -- Online Sales 8 -- Worldwide Opportunity 9 -- Enter the Intranet 10 -- Chapter 2 Security and the Internet 13 -- The Physical World vs. the Networked World 15 -- Authentication 17 -- Authorization Authentication 19 -- Privacy and Confidentiality 20 -- Data Integrity 22 -- Trust 23 -- Chapter 3 Securing the Internet 27 -- Chapter 4 Public Key Infrastructure 41 -- Network of Trust 43 -- Identity Verification 43 -- Technology 45 -- Applying for a Certificate 46 -- Certificate Management 51 -- Policies, Procedures, and Practices 52 -- Operations 53 -- Part 2 Case Studies 55 -- Chapter 5 Uses of Public Key Systems 57 -- Justification 58 -- Public Key Buckets 60 -- Identification 61 -- Securing Communication 62 -- Application Integration 63 -- Chapter 6 Identification and Authentication 65 -- GE Research Center 66 -- GTE 69 -- Hewlett-Packard 70 -- Liberty Financial Companies, Inc. 72 -- State of Massachusetts 77 -- QSpace 80 -- USWeb 83 -- Chapter 7 Securing Communication 85 -- Ultramar Diamond Shamrock 87 -- Mellon Bank 89 -- PrimeHost 90 -- Wells Fargo 92 -- Chapter 8 Application Integration 95 -- CyberCash 96 -- E-Stamp 98 -- NetDox 101 -- Open Market, Inc. 104 -- United States Postal Service 106 -- Chapter 9 Secure Electronic Transaction Protocol 109 -- Business Situation 110 -- How SET Works 112 -- Part 3 Issues 117 -- Chapter 10 Technical Issues 119 -- Hardware vs. Software 120 -- Interoperability 122 -- In-House vs. Outsourcing 122 -- Algorithms 123 -- Public Key Cryptography in Applications 125 -- Standards 126 -- Key Size and Key Splitting 126 -- Key Recovery/Escrow 127 -- Security Policies and Procedures 128 -- Registration Authority Functionality 129 -- Directory Services 129 -- Revocation Lists 130 -- Chapter 11 Legal Issues 131 -- Digital Signature Legislation 133 -- Certificate Holder Responsibility 134 -- CA Responsibilities and Liabilities 135 -- CA Requirements 135 -- Technology Implications and Requirements 136 -- International Issues 136 -- Certification Practice Statements 138 -- Relying Parties 139 -- Agreements 139 -- Chapter 12 Business Issues 141 -- Business Models and Risks 142 -- Hardware vs. Software 146 -- Interoperability and Cross Certification 146 -- In-House vs. Outsourcing 146 -- Public Key Cryptography in Applications 148 -- Key Recovery/Escrow 149 -- Security Policies and Procedures 149 -- Certificate Holder Responsibility 150 -- Chapter 13 Developing Requirements 151 -- Product or Service? 152 -- Understanding Requirements 152 -- Futures 156 -- Budget 157 -- Pricing 157 -- Requirements Document Contents 158 -- Evaluation 158 -- Part 4 Vendor Review 159 -- Chapter 14 CA Products and Services 161 -- Atalla Corporation 162 -- BBN Corporation 164 -- CertCo 167 -- Cylink Corporation 168 -- Entrust Technologies Inc. 171 -- GTE CyberTrust Solutions Incorporated 172 -- International Business Machines Corporation (IBM) 174 -- Netscape Communications 176 -- VeriSign 177 -- Xcert Software Inc. 179 -- Chapter 15 Application and Toolkit Vendors 183 -- E-Stamp Corporation 184 -- Products/Services Offered 185 -- Harbinger 186 -- Premenos Technology Corporation 187 -- RSA Data Security, Inc., a Security Dynamics Company 189 -- S/MIME Products 191 -- SET Vendors 194 -- Web Browser and Server Vendors 196 -- Part 5 What the Future Holds 197 -- Chapter 16 Future Applications 199 -- Remote Authentication 200 -- Internet VAN 200 -- Remote Trusted Devices 201 -- Distributed Applications 202 -- Signed Instruments 202 -- The Impact of Certificates and Digital Signatures on Business 203 -- Closing Notes 204 -- Appendix I Hobbes' Internet Timeline 205 -- Appendix II Trading Partner Agreement 223 -- Digital Signature Trading Partner Agreement 223 -- Appendix III Digital Signature Legislation 231 -- II. The Law of Signatures 231 -- III. Digital Signature Technology 235 -- IV. Verifying Owners of Public Key Pairs 239 -- V. Legal Considerations 241 -- VI. Overview of Liability 244 -- VII. Liability for the Loss or Compromise of the Private Key by Subscribers 245 -- VIII. Liability of Certification Authorities 246 -- IX. Regulatory Oversight of Certification Authorities 249 -- X. Technological Standards 250 -- XI. Digital Signature Legislation 251 -- Appendix IV Digital Signature Legislation Status 259 -- State Legislation and Regulations 259 -- Federal Legislation and Regulations 283 -- International 284 -- Appendix V Pointers to Pertinent Web Sites 287 -- Appendix VI US Government 291
Summary Details the business, legal, social, and technological issues surrounding digital signatures and public key infrastructure. Explains in terms that a businessperson can understand, covering the unique problems of online authentication, how digital signatures can help to solve these problems, ways companies are using the technology in real life, and issues concerning its usage
Notes Includes index
Subject Computer networks -- Security measures.
Computer security.
Data encryption (Computer science)
LC no. 97039998
ISBN 0070125546 (alk. paper)