A Practical Approach to Expose the Public Key Infrastructure Features through Webservices
نویسنده
چکیده
The Public Key Infrastructure (PKI) provides services that permit users to communicate in a secure manner on an unsecure network by means of digital certificates and cryptography primitives. However, in order to secure an application through cryptography and PKI, cryptographic primitives need to be implemented in the programming language used to develop the application. This raises scalability and interoperability issues as the diversity of programming languages and development environments requires all cryptography primitives to be implemented in each of the existing programming languages. Therefore, this paper presents a practical approach to secure an application with cryptographic primitives developed in different languages through service oriented architecture technology.
منابع مشابه
Physical Distribution Service Quality through Iranian Convenience Stores Retailers Perspectives: a Mixed Method Approach
Due to the importance of Physical Distribution Service Quality (PDSQ) in logisticsystems, the purpose of this paper is to design a practical scale for measuring theconstruct through the perspectives of Iranian convenience store retailers. A mixedmethodapproach was employed for the study; in- depth interviews were first carriedout with 16 Iranian experienced retailers who actively had worked in ...
متن کاملInfrastructural Investment Opportunities for the Development of Agricultural Businesses Based on Public- Private Partnership Approach
Agricultural infrastructured included the entire body of basic services needed for the growth of an economy and for the improvement of the efficiency of the markets related to food and dietary fiber. Investment in agricultural infrastructure calls for a wide- spread collaboration among the various organization involved in the sector. The main purpose of the present research was to identify...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملSecure Information Sharing Using Attribute Certificates and Role Based Access Control
In this paper, we explore the issues involved with the design and rapid deployment of large scale secure information sharing (SIS) systems for coordination involved with multiple agencies. Procedures and tools were developed for setting up quickly the public key infrastructure (PKI) and privilege management infrastructure (PMI) for the multi-agency SIS systems. A multi-agency SIS testbed based ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014