53. , CCITT. Recommendation X.209: Specification of Basic Encoding Rules for Abstract Syntax Notation One (ASN.1), Geneva, 1988
54. , CCITT Recommendation X.500: The Directory, Geneva, 1993
55. , CCITT. Recommendation X.501: The Directory - Models, Geneva, 1988
56. , CCITT. Recommendation X.800: Security Architecture for Open Systems Interconnection for CCITT Applications, Geneva, 1991
57. Chadwick D.W., Otenko A., Ball E, Implementing Role Based Access Controls Using X.509 Attribute Certificates,
58. Chadwick D.W., Otenko A., Hunter D., Leoni C, Privilege Management for E-construction,
59. , Common Criteria for Information Technology. Security Evaluation, Part 3: Security Assurance Requirements. January 2004. Version 2.2
60. Cooper D.A., Polk W.T, NIST Recommendation for X.509 Path Validation Version 0.5, 2004
61. , Current Methods of Authentication,
62. , Delta CRLs,
63. Diffie W., Hellman M.E, New Directions In Cryptography,
64. Dittrich D, Network "sniffers" and You,
65. Ellison C., Schneier B, Ten Risks of PKI: What You're not Being Told about Public Key Infrastructure, Computer Security Journal, vol. XVI, number 1, 2000
66. , Extensible Markup Language (XML) 1.0 (Third Edition),
67. Hallam-Baker P., Ford W, Internet X.509 Public Key Infrastructure. Enhanced CRL distribution options, Internet Draft, PKIX Working Group, August 1998
68. Hellberg S, SWEDAC-EID-SAT: Test specification of EID Cards and certificates,
69. Hesse P.M., Lemire D.P, Managing Interoperability in Non-Hierarchical Public Key In-frastructures,
70. Housley R., Polk W. T, Planning for PKI: Best practices for PKI Deployment, Wiley &Sons, 2001
71. , Integration of DCE with a Public Key Infrastructure,
72. , Introduction to Security Overview. Authentication and Identification Methods,
73. , Introduction to Single Sign-On, The Open Group,
74. , ISO/IEC 8824 Object Identifiers (OIDs),
75. , ISO/IEC JT1/SC27 WD 14516-1, Guidelines for the use and management of Trusted Third Party services - Part 1:General Overview, 1995.11
76. , ISO/IEC JT1/SC27 WD 14516-2, Guidelines for the use and management of Trusted Third Party services - Part 2: Technical aspects, 21.06.1996
77. , ITU-T (International Telecommunications Union) Recommendation X.509: Information Technology - Open Systems Interconnection -The Directory: Authentication Framework, 1997
78. , ITU-T Recommendation X.509, "Information Technology - Open Systems Interconnection - The Directory: Public Key and Attribute Certificate Frameworks", June 2000
79. Jarupunphol P., Mitchell C, PKI implementation issues in B2B e-commerce EICAR Conference Best Paper Proceedings, 2003
80. Johner H., Fujiwara S., Sm Yeung A., Stephanou A. W, Deploying a Public Key Infrastructure I, nternational Technical Support Organization, SG24-5512-00, February 2000
81. , Kerberos: The Network Authentication Protocol,
82. Kiran S., Lareau P., Lloyd S, PKI Basics - A Technical Introduction, A PKI Forum Note, November 2002
83. Kocher P.A, Quick Introduction to Certificate Revocation Trees (CRTs),
84. Kuhn D.R., Hu Vincent C., Polk W.T, Chang Shu-Jen, Introduction to Public Key Technology and the Federal PKI Infrastructure, National Institute of Standards and Technology, February, 2001
85. Lamport L, Password Authentication with Insecure Communication, Coomunications of the ACM, vol. 24, no. 11, 1981, p. 770-772
86. Lareau P, PKI Basics - A Business Perspective, A PKI Forum Note, April 2002, www.pkiforum.org/resourcees.html
87. , LDAP Duplication/Replication/Update Protocols (ldup),
88. Linn J., Branchaud M, An Examination of Asserted PKI Issues and Proposed Alternatives,
89. Lloyd S, Understanding Certification Path Construction, A PKI Forum White Paper, September 2002
90. Lloyd S, Paving the Road to PKI Interoperability,
Вильям Л Саймон , Вильям Саймон , Наталья Владимировна Макеева , Нора Робертс , Юрий Викторович Щербатых
Зарубежная компьютерная, околокомпьютерная литература / ОС и Сети, интернет / Короткие любовные романы / Психология / Прочая справочная литература / Образование и наука / Книги по IT / Словари и Энциклопедии