91. Malpani A., Hoffman P., Housley R, Simple Certificate Validation Protocol (SCVP) Internet Draft November 2000,
92. , Minimum Interoperability Specification for PKI. Components, Version 2 - Second DRAFT, 2000. NIST PKI Project Team
93. Needham R. Schroeder M, Using Encryption for Authenticating in Large Networks of Computers, Coomunications of the ACM, vol. 21, no. 12, 1978, p. 995-999
94. , OASIS PKI Resources,
95. , OASIS Security Services (Security Assertion Markup Language - SAML) TC,
96. Olnes J., Verdier M., Ganivet N., Maillot D., Skretting J, Public Key Infrastructure and Certification Policy for Interdomain Management,
97. Perlman Radia, An Overview of PKI Trust Models,
98. , PGP User's Guide, Volume I: Essential Topics,
99. , PKI Interoperability Framework. PKI Forum White Paper,
100. Polk W.T., Hastings N.E., Malpani A, Public Key Infrastructures that Satisfy Security Goals,
101. Polk W.T., Hastings N.E, Bridge Certification Authorities: Connecting B2B Public Key Infrastructures, NIST,
102. , Public-Key Cryptography Standards, RSA Laboratories,
103. , Public Key Infrastructure. Request For Proposal. Object Management Group Document: ec/99-01-15,
104. , Public Key Infrastructure Standards,
105. Raina K, PKI Security Solutions for Enterprise: Solving HIPAA, E-Paper Act, and Other Compliance Issues, Wiley Publishing, Inc., 2003
106. Reese A, The Architecture of Privacy, 2004
107. , Request for Proposals for Certification Authority and Public Key Infrastructure Services, Office of the Secretary of Kansas State. Draft copy, 2001
108. , Secure Network Time Protocol (stime),
109. , Secure Socket Layer (SSL) 3.0 Specification,
110. , Securities Industry Root. Certificate Authority (SIRCA),
111. , Security Assertion Markup Language (SAML),
112. , Security Service API: Cryptographic API Recommendation Second Edition, NSA Cross Organization CAPI Team July 1, 1996
113. , SET Secure Electronic Transaction Specification. Book 1: Business Description, May 31, 1997
114. , SET Secure Electronic Transaction Specification. Book 2: Programmer's Guide,
115. , SET Secure Electronic Transaction. Specification. Book 3: Formal Protocol Definition, May 31, 1997
116. Slagell A.J, Bonilla R, PKI Scalability Issues,
117. , Standard for Entity Authentication Using Public Key Cryptography, FIPS 196 - Federal Information Processing Standard Publication 196, 1997
118. Stapleton J, CA Trust, A PKI Forum Note, July 2001
119. , Synopsis of PKI and Related Standards, The Center For Information Technology Stan-dards, 2000
120. , Time Signing, Symmetricom Trusted Time,
121. Turnbull J, Cross-Certification and PKI Policy Networking August 2000 Version: 1.0,
122. , Understanding Public Key Infrastructure (PKI), Technology White Paper, PKI WP 0999, RSA Security Inc., 1999
123. , What Are CA Certificates?,
124. , What is meant by trust?,
125. , WHAT IS SESAME?,
126. , X.500: Directory Access Protocol (DAP),
127. , X.500 Directories Part 2-Core Directory Information Tree and Schema Guideline,
128. , X.509 Certificate Policy. for the. E-Governance Certification Authorities, Version 1.3 9 November 2005
Вильям Л Саймон , Вильям Саймон , Наталья Владимировна Макеева , Нора Робертс , Юрий Викторович Щербатых
Зарубежная компьютерная, околокомпьютерная литература / ОС и Сети, интернет / Короткие любовные романы / Психология / Прочая справочная литература / Образование и наука / Книги по IT / Словари и Энциклопедии