Understanding digital signatures: establishing trust over the Internet and other networks
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York [u.a.]
McGraw-Hill
1998
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XV, 298 S. graph. Darst. |
ISBN: | 0070125546 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV012112528 | ||
003 | DE-604 | ||
005 | 19980917 | ||
007 | t | ||
008 | 980818s1998 d||| |||| 00||| eng d | ||
020 | |a 0070125546 |9 0-07-012554-6 | ||
035 | |a (OCoLC)37616158 | ||
035 | |a (DE-599)BVBBV012112528 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-355 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 658.4/78 |2 21 | |
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
100 | 1 | |a Grant, Gail L. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Understanding digital signatures |b establishing trust over the Internet and other networks |c Gail L. Grant |
264 | 1 | |a New York [u.a.] |b McGraw-Hill |c 1998 | |
300 | |a XV, 298 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 7 | |a Coderingstheorie |2 gtt | |
650 | 7 | |a Computerbeveiliging |2 gtt | |
650 | 7 | |a Computernetwerken |2 gtt | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 0 | 7 | |a Chiffrierung |0 (DE-588)4352893-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenverarbeitung |0 (DE-588)4011152-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Elektronische Unterschrift |0 (DE-588)4269037-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Chiffrierung |0 (DE-588)4352893-4 |D s |
689 | 0 | 1 | |a Datenverarbeitung |0 (DE-588)4011152-0 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Elektronische Unterschrift |0 (DE-588)4269037-7 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 2 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 2 | |5 DE-604 | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=008201435&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-008201435 |
Datensatz im Suchindex
_version_ | 1804126717087842304 |
---|---|
adam_text | CONTENTS
Preface xi
Acknowledgments xiii
Copyrights and Trademarks xv
¦HI BACKGROUND AND DEFINITION 1
Chapter 1 Background 3
E mail and Customer Service 6
The World Wide Web 6
More than Billboards 8
Online Sales 8
Worldwide Opportunity 9
Enter the Intranet 1 o
Chapter 2 Security and the Internet 13
The Physical World vs. the Networked World 1 5
Authentication 17
Authorization Authentication 19
Privacy and Confidentiality 20
Data Integrity 22
Trust 23
Chapter 3 Securing the Internet 27
Chapter 4 Public Key Infrastructure 41
Network of Trust 43
Identity Verification 43
Technology 45
Applying for a Certificate 46
Certificate Management 51
Policies, Procedures, and Practices 52
Operations 53
V
VI Contents
«HT2 CASE STUDIES 55
Chapter 5 Uses of Public Key Systems 57
Justification 58
Public Key Buckets 60
Identification 61
Securing Communication 62
Application Integration 63
Chapter 6 Identification and Authentication 65
GE Research Center 66
GTE 69
Hewlett Packard 70
Liberty Financial Companies, Inc. 72
State of Massachusetts 77
QSpace 80
USWeb 83
Chapter 7 Securing Communication 85
Ultramar Diamond Shamrock 87
Mellon Bank 89
PrimeHost 90
Wells Fargo . 92
Chapter 8 Application Integration 95
CyberCash 96
E Stamp 98
NetDox 101
Open Market, Inc. 104
United States Postal Service 106
Chapter 9 Secure Electronic Transaction Protocol 109
Business Situation 110
How SET Works 112
Contents Vli
¦¦¦3 ISSUES 117
Chapter 10 Technical Issues 1 19
Hardware vs. Software 120
Interoperability 122
In House vs. Outsourcing 122
Algorithms 123
Public Key Cryptography in Applications 125
Standards 126
Key Size and Key Splitting 126
Key Recovery/Escrow 127
Security Policies and Procedures 128
Registration Authority Functionality 129
Directory Services 129
Revocation Lists 130
Chapter 11 Legal Issues 131
Digital Signature Legislation 133
Certificate Holder Responsibility 134
CA Responsibilities and Liabilities 135
CA Requirements 135
Technology Implications and Requirements 136
International Issues 136
Certification Practice Statements 138
Relying Parties 139
Agreements 139
Chapter 12 Business Issues 141
Business Models and Risks 142
Hardware vs. Software 146
Interoperability and Cross Certification 146
In House vs. Outsourcing 146
Public Key Cryptography in Applications 148
Key Recovery/Escrow 149
Security Policies and Procedures 149
Certificate Holder Responsibility 150
Viii Contents
Chapter 13 Developing Requirements 151
Product or Service? 152
Understanding Requirements 152
Futures 156
Budget 157
Pricing 157
Requirements Document Contents 158
Evaluation 158
¦¦¦4 VENDOR REVIEW 159
Chapter 14 CA Products and Services 161
Atalla Corporation 162
BBN Corporation 164
CertCo 167
Cylink Corporation 168
Entrust Technologies Inc. 171
GTE CyberTrust Solutions Incorporated 172
International Business Machines Corporation |IBM) 174
Netscape Communications 176
VeriSign 177
Xcert Software Inc. 179
Chapter 15 Application and Toolkit Vendors 183
E Stamp Corporation 184
Products/Services Offered 185
Harbinger 186
Premenos Technology Corporation 187
RSA Data Security, Inc., a Security Dynamics Company 189
S/MIME Products 191
SET Vendors 194
Web Browser and Server Vendors 196
¦¦H5 WHAT THE FUTURE HOLDS 197
Chapter 16 Future Applications 199
Remote Authentication 200
Internet VAN 200
Contents IX
Remote Trusted Devices 201
Distributed Applications 202
Signed Instruments 202
The Impact of Certificates and Digital Signatures on Business 203
Closing Notes 204
Appendix I Hobbes Internet Timeline 205
Appendix II Trading Partner Agreement 223
Digital Signature Trading Partner Agreement 223
Appendix III Digital Signature Legislation 231
I. Introduction 231
II. The Law of Signatures 231
III. Digital Signature Technology 235
IV Verifying Owners of Public Key Pairs 239
V Legal Considerations 241
VI. Overview of Liability 244
VII. Liability for the Loss or Compromise of the Private Key
by Subscribers 245
VIII. Liability of Certification Authorities 246
IX. Regulatory Oversight of Certification Authorities 249
X. Technological Standards 250
XI. Digital Signature Legislation 251
XII. Conclusion 257
Appendix IV Digital Signature Legislation Status 259
State Legislation and Regulations 259
Federal Legislation and Regulations 283
International 284
Appendix V Pointers to Pertinent Web Sites 287
Appendix VI US Government 291
Index 295
|
any_adam_object | 1 |
author | Grant, Gail L. |
author_facet | Grant, Gail L. |
author_role | aut |
author_sort | Grant, Gail L. |
author_variant | g l g gl glg |
building | Verbundindex |
bvnumber | BV012112528 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 273 |
ctrlnum | (OCoLC)37616158 (DE-599)BVBBV012112528 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Informatik Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02043nam a2200529 c 4500</leader><controlfield tag="001">BV012112528</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">19980917 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">980818s1998 d||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0070125546</subfield><subfield code="9">0-07-012554-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)37616158</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV012112528</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Grant, Gail L.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Understanding digital signatures</subfield><subfield code="b">establishing trust over the Internet and other networks</subfield><subfield code="c">Gail L. Grant</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York [u.a.]</subfield><subfield code="b">McGraw-Hill</subfield><subfield code="c">1998</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XV, 298 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Coderingstheorie</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computerbeveiliging</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computernetwerken</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=008201435&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-008201435</subfield></datafield></record></collection> |
id | DE-604.BV012112528 |
illustrated | Illustrated |
indexdate | 2024-07-09T18:21:53Z |
institution | BVB |
isbn | 0070125546 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-008201435 |
oclc_num | 37616158 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | XV, 298 S. graph. Darst. |
publishDate | 1998 |
publishDateSearch | 1998 |
publishDateSort | 1998 |
publisher | McGraw-Hill |
record_format | marc |
spelling | Grant, Gail L. Verfasser aut Understanding digital signatures establishing trust over the Internet and other networks Gail L. Grant New York [u.a.] McGraw-Hill 1998 XV, 298 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Coderingstheorie gtt Computerbeveiliging gtt Computernetwerken gtt Computer networks Security measures Computer security Data encryption (Computer science) Chiffrierung (DE-588)4352893-4 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Datenverarbeitung (DE-588)4011152-0 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Elektronische Unterschrift (DE-588)4269037-7 gnd rswk-swf Chiffrierung (DE-588)4352893-4 s Datenverarbeitung (DE-588)4011152-0 s DE-604 Elektronische Unterschrift (DE-588)4269037-7 s Rechnernetz (DE-588)4070085-9 s Datensicherung (DE-588)4011144-1 s HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=008201435&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Grant, Gail L. Understanding digital signatures establishing trust over the Internet and other networks Coderingstheorie gtt Computerbeveiliging gtt Computernetwerken gtt Computer networks Security measures Computer security Data encryption (Computer science) Chiffrierung (DE-588)4352893-4 gnd Rechnernetz (DE-588)4070085-9 gnd Datenverarbeitung (DE-588)4011152-0 gnd Datensicherung (DE-588)4011144-1 gnd Elektronische Unterschrift (DE-588)4269037-7 gnd |
subject_GND | (DE-588)4352893-4 (DE-588)4070085-9 (DE-588)4011152-0 (DE-588)4011144-1 (DE-588)4269037-7 |
title | Understanding digital signatures establishing trust over the Internet and other networks |
title_auth | Understanding digital signatures establishing trust over the Internet and other networks |
title_exact_search | Understanding digital signatures establishing trust over the Internet and other networks |
title_full | Understanding digital signatures establishing trust over the Internet and other networks Gail L. Grant |
title_fullStr | Understanding digital signatures establishing trust over the Internet and other networks Gail L. Grant |
title_full_unstemmed | Understanding digital signatures establishing trust over the Internet and other networks Gail L. Grant |
title_short | Understanding digital signatures |
title_sort | understanding digital signatures establishing trust over the internet and other networks |
title_sub | establishing trust over the Internet and other networks |
topic | Coderingstheorie gtt Computerbeveiliging gtt Computernetwerken gtt Computer networks Security measures Computer security Data encryption (Computer science) Chiffrierung (DE-588)4352893-4 gnd Rechnernetz (DE-588)4070085-9 gnd Datenverarbeitung (DE-588)4011152-0 gnd Datensicherung (DE-588)4011144-1 gnd Elektronische Unterschrift (DE-588)4269037-7 gnd |
topic_facet | Coderingstheorie Computerbeveiliging Computernetwerken Computer networks Security measures Computer security Data encryption (Computer science) Chiffrierung Rechnernetz Datenverarbeitung Datensicherung Elektronische Unterschrift |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=008201435&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT grantgaill understandingdigitalsignaturesestablishingtrustovertheinternetandothernetworks |