{"title":"Public Key Infrastructure for Messaging Security","authors":"Philip Carden","doi":"10.1201/1086/43304.8.1.19990301/31050.6","DOIUrl":null,"url":null,"abstract":"Abstract Changes in IT infrastructure enable new classes of applications to exist. For example, the proliferation of the personal computer in the 1980s enabled office automation applications to gain critical mass, while deployment of TCP/IP in the early 1990s set the stage for client/server deployment and the widespread use of Web technologies. Simply put, infrastructure enables applications. The next major wave of applications will revolve around electronic commerce, which relies on a number of infrastructure technologies, not the least of which are TCP/IP and Web technologies. However, there is one key enabling technology for these applications which is not yet sufficiently deployed — public key encryption.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1999-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Inf. Secur. J. A Glob. Perspect.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1201/1086/43304.8.1.19990301/31050.6","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Abstract Changes in IT infrastructure enable new classes of applications to exist. For example, the proliferation of the personal computer in the 1980s enabled office automation applications to gain critical mass, while deployment of TCP/IP in the early 1990s set the stage for client/server deployment and the widespread use of Web technologies. Simply put, infrastructure enables applications. The next major wave of applications will revolve around electronic commerce, which relies on a number of infrastructure technologies, not the least of which are TCP/IP and Web technologies. However, there is one key enabling technology for these applications which is not yet sufficiently deployed — public key encryption.