A Practical Approach to Expose the Public Key Infrastructure Features through Webservices

نویسنده

  • Ebot Ebot Enaw
چکیده

The Public Key Infrastructure (PKI) provides services that permit users to communicate in a secure manner on an unsecure network by means of digital certificates and cryptography primitives. However, in order to secure an application through cryptography and PKI, cryptographic primitives need to be implemented in the programming language used to develop the application. This raises scalability and interoperability issues as the diversity of programming languages and development environments requires all cryptography primitives to be implemented in each of the existing programming languages. Therefore, this paper presents a practical approach to secure an application with cryptographic primitives developed in different languages through service oriented architecture technology.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Physical Distribution Service Quality through Iranian Convenience Stores Retailers Perspectives: a Mixed Method Approach

Due to the importance of Physical Distribution Service Quality (PDSQ) in logisticsystems, the purpose of this paper is to design a practical scale for measuring theconstruct through the perspectives of Iranian convenience store retailers. A mixedmethodapproach was employed for the study; in- depth interviews were first carriedout with 16 Iranian experienced retailers who actively had worked in ...

متن کامل

Infrastructural Investment Opportunities for the Development of Agricultural Businesses Based on Public- Private Partnership Approach

     Agricultural infrastructured included the entire body of basic services needed for the growth of an economy and for the improvement of the efficiency of the markets related to food and dietary fiber. Investment in agricultural infrastructure calls for a wide- spread collaboration among the various organization involved in the sector. The main purpose of the present research was to identify...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

Secure Information Sharing Using Attribute Certificates and Role Based Access Control

In this paper, we explore the issues involved with the design and rapid deployment of large scale secure information sharing (SIS) systems for coordination involved with multiple agencies. Procedures and tools were developed for setting up quickly the public key infrastructure (PKI) and privilege management infrastructure (PMI) for the multi-agency SIS systems. A multi-agency SIS testbed based ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014