Back to Results
First PageMeta Content
Public key infrastructure / X.509 / Certificate policy / Revocation list / Web of trust / Digital signature / Certificate authority / Public key certificate / Trusted third party / Cryptography / Public-key cryptography / Key management


Global Co-Operation in the New Millennium The 9th European Conference on Information Systems Bled, Slovenia, June 27-29, 2001 THE FUNDAMENTAL INADEQUACIES OF CONVENTIONAL PUBLIC KEY INFRASTRUCTURE
Add to Reading List

Document Date: 2001-05-31 06:19:16


Open Document

File Size: 53,24 KB

Share Result on Facebook

City

Austin / Information Systems Bled / Canberra / /

Company

Verisign / Ford / Xamax Consultancy Pty Ltd / /

Country

Slovenia / United Kingdom / /

/

IndustryTerm

web-context / software agents / Online Certificate Status Protocol / public key infrastructure / intellectual property law / hash algorithm / Internet variant / conventional technology / malicious software / e-trust / software agent / real-world applications / systems software / web-site / online identities / public relations techniques / remote communications / trustmanagement systems / software processes / web-browsers / e - commerce / social networks / public networks / public relations / commercially-available web-browsers / legal systems / Internet Access Providers / Digital signature technology / software process / legal infrastructure / electronic commerce / /

OperatingSystem

MacOS / Macintosh / Microsoft Windows / /

Organization

Information Society / Department of Computer Science / Registration Authority / Post Office / Australian National University / /

Person

Roger Clarke / /

Position

qualifier / evaluator / Private / /

ProvinceOrState

California / /

PublishedMedium

the Information Society / /

Technology

PUBLIC KEY INFRASTRUCTURE / hash algorithm / PKI / Digital signature technology / private key / key technologies / cryptography / public key / currently conventional technology / HTTP / digital signature / /

SocialTag