Читаем Инфраструктуры открытых ключей полностью

53. , CCITT. Recommendation X.209: Specification of Basic Encoding Rules for Abstract Syntax Notation One (ASN.1), Geneva, 1988

54. , CCITT Recommendation X.500: The Directory, Geneva, 1993

55. , CCITT. Recommendation X.501: The Directory - Models, Geneva, 1988

56. , CCITT. Recommendation X.800: Security Architecture for Open Systems Interconnection for CCITT Applications, Geneva, 1991

57. Chadwick D.W., Otenko A., Ball E, Implementing Role Based Access Controls Using X.509 Attribute Certificates,

58. Chadwick D.W., Otenko A., Hunter D., Leoni C, Privilege Management for E-construction,

59. , Common Criteria for Information Technology. Security Evaluation, Part 3: Security Assurance Requirements. January 2004. Version 2.2

60. Cooper D.A., Polk W.T, NIST Recommendation for X.509 Path Validation Version 0.5, 2004

61. , Current Methods of Authentication,

62. , Delta CRLs,

63. Diffie W., Hellman M.E, New Directions In Cryptography,

64. Dittrich D, Network "sniffers" and You,

65. Ellison C., Schneier B, Ten Risks of PKI: What You're not Being Told about Public Key Infrastructure, Computer Security Journal, vol. XVI, number 1, 2000

66. , Extensible Markup Language (XML) 1.0 (Third Edition),

67. Hallam-Baker P., Ford W, Internet X.509 Public Key Infrastructure. Enhanced CRL distribution options, Internet Draft, PKIX Working Group, August 1998

68. Hellberg S, SWEDAC-EID-SAT: Test specification of EID Cards and certificates,

69. Hesse P.M., Lemire D.P, Managing Interoperability in Non-Hierarchical Public Key In-frastructures,

70. Housley R., Polk W. T, Planning for PKI: Best practices for PKI Deployment, Wiley &Sons, 2001

71. , Integration of DCE with a Public Key Infrastructure,

72. , Introduction to Security Overview. Authentication and Identification Methods,

73. , Introduction to Single Sign-On, The Open Group,

74. , ISO/IEC 8824 Object Identifiers (OIDs),

75. , ISO/IEC JT1/SC27 WD 14516-1, Guidelines for the use and management of Trusted Third Party services - Part 1:General Overview, 1995.11

76. , ISO/IEC JT1/SC27 WD 14516-2, Guidelines for the use and management of Trusted Third Party services - Part 2: Technical aspects, 21.06.1996

77. , ITU-T (International Telecommunications Union) Recommendation X.509: Information Technology - Open Systems Interconnection -The Directory: Authentication Framework, 1997

78. , ITU-T Recommendation X.509, "Information Technology - Open Systems Interconnection - The Directory: Public Key and Attribute Certificate Frameworks", June 2000

79. Jarupunphol P., Mitchell C, PKI implementation issues in B2B e-commerce EICAR Conference Best Paper Proceedings, 2003

80. Johner H., Fujiwara S., Sm Yeung A., Stephanou A. W, Deploying a Public Key Infrastructure I, nternational Technical Support Organization, SG24-5512-00, February 2000

81. , Kerberos: The Network Authentication Protocol,

82. Kiran S., Lareau P., Lloyd S, PKI Basics - A Technical Introduction, A PKI Forum Note, November 2002

83. Kocher P.A, Quick Introduction to Certificate Revocation Trees (CRTs),

84. Kuhn D.R., Hu Vincent C., Polk W.T, Chang Shu-Jen, Introduction to Public Key Technology and the Federal PKI Infrastructure, National Institute of Standards and Technology, February, 2001

85. Lamport L, Password Authentication with Insecure Communication, Coomunications of the ACM, vol. 24, no. 11, 1981, p. 770-772

86. Lareau P, PKI Basics - A Business Perspective, A PKI Forum Note, April 2002, www.pkiforum.org/resourcees.html

87. , LDAP Duplication/Replication/Update Protocols (ldup),

88. Linn J., Branchaud M, An Examination of Asserted PKI Issues and Proposed Alternatives,

89. Lloyd S, Understanding Certification Path Construction, A PKI Forum White Paper, September 2002

90. Lloyd S, Paving the Road to PKI Interoperability,

Перейти на страницу:

Все книги серии Основы информационных технологий

Похожие книги