Skip to main content

Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure

Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure

Russ Housley, Tim Polk

ISBN: 978-0-471-39702-1

Mar 2001

352 pages

Select type: Paperback

In Stock

$80.00

Description

An in-depth technical guide on the security technology driving Internet e-commerce expansion.
""Planning for PKI"" examines the number-one Internet security technology that will be widely adopted in the next two years. Written by two of the architects of the Internet PKI standards, this book provides authoritative technical guidance for network engineers, architects, and managers who need to implement the right PKI architecture for their organization. The authors discuss results and lessons learned from early PKI pilots, helping readers evaluate PKI deployment impact on current network architecture while avoiding the pitfalls of early technical mistakes. Four technical case studies detail the do's and don'ts of PKI implementation, illustrating both successes and failures of different deployments. Readers will also learn how to leverage future PKI-related technologies for additional benefits.
Foreword.

Acknowledgments.

Introduction.

Cryptography Primer.

PKI Basics.

Authentication Mechanisms.

PKI Components and Users.

PKI Architectures.

X.509 Public Key Certificates.

Certificate Revocation Lists.

Repository Protocols.

Building and Validating Certification Paths.

PKI Management Protocols.

Policies, Procedures, and PKI.

PKI-Enabled Applications.

Defense Message System 1.0.

California Independent Service Operator.

The Federal Bridge CA Project.

Future Developments.

Appendix A: ASN.1 Primer.

Appendix B: Object Identifiers.

Bibliography.

Index.
""Rather than being an abstract academic text, the authors, Russ Housley and Tim Polk, write from years of practical experience. Housley is the Chief Scientist for Spyrus, and Polk is the technical lead for PKI at NIST. At a little over 300 pages, Planning for PKI is a valuable reference to the workings of PKI.""
--Ben Rothke; UnixReview.com (5/7/01)