{"title":"用于消息传递安全的公钥基础设施","authors":"Philip Carden","doi":"10.1201/1086/43304.8.1.19990301/31050.6","DOIUrl":null,"url":null,"abstract":"Abstract Changes in IT infrastructure enable new classes of applications to exist. For example, the proliferation of the personal computer in the 1980s enabled office automation applications to gain critical mass, while deployment of TCP/IP in the early 1990s set the stage for client/server deployment and the widespread use of Web technologies. Simply put, infrastructure enables applications. The next major wave of applications will revolve around electronic commerce, which relies on a number of infrastructure technologies, not the least of which are TCP/IP and Web technologies. However, there is one key enabling technology for these applications which is not yet sufficiently deployed — public key encryption.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1999-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Public Key Infrastructure for Messaging Security\",\"authors\":\"Philip Carden\",\"doi\":\"10.1201/1086/43304.8.1.19990301/31050.6\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract Changes in IT infrastructure enable new classes of applications to exist. For example, the proliferation of the personal computer in the 1980s enabled office automation applications to gain critical mass, while deployment of TCP/IP in the early 1990s set the stage for client/server deployment and the widespread use of Web technologies. Simply put, infrastructure enables applications. The next major wave of applications will revolve around electronic commerce, which relies on a number of infrastructure technologies, not the least of which are TCP/IP and Web technologies. However, there is one key enabling technology for these applications which is not yet sufficiently deployed — public key encryption.\",\"PeriodicalId\":207082,\"journal\":{\"name\":\"Inf. Secur. J. A Glob. Perspect.\",\"volume\":\"46 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1999-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Inf. Secur. J. A Glob. Perspect.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1201/1086/43304.8.1.19990301/31050.6\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Inf. Secur. J. A Glob. Perspect.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1201/1086/43304.8.1.19990301/31050.6","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Abstract Changes in IT infrastructure enable new classes of applications to exist. For example, the proliferation of the personal computer in the 1980s enabled office automation applications to gain critical mass, while deployment of TCP/IP in the early 1990s set the stage for client/server deployment and the widespread use of Web technologies. Simply put, infrastructure enables applications. The next major wave of applications will revolve around electronic commerce, which relies on a number of infrastructure technologies, not the least of which are TCP/IP and Web technologies. However, there is one key enabling technology for these applications which is not yet sufficiently deployed — public key encryption.