Table of Contents Chapter Index Previous Slide Next Slide 12
Security

Key Infrastructure Capabilities
Security
  • Security system requirements

    1. Registration - persistant storage of identification information

    2. Identification - a claim of identification credentials

    3. Authentication - verification of the identification claim

    4. Authorization - access rights to a resource

    5. Cryptography - encrypted data transactions

  • Security technologies

    • GSS (Generic Security Service)

    • SSL (Secure Socket Layer)

    • X.509 (Public Key Certificates)

    • etc