Access the full text.
Sign up today, get DeepDyve free for 14 days.
S. Kent (1989)
Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key ManagementRFC, 1422
(1994)
Proposed Draft Amendment ISOIIEC 9594 PDAM-1 for Certificate Extensions
J. Linn (1989)
Privacy enhancement for Internet electronic mail: Part III - algorithms, modes, and identifiersRFC, 1115
31] ANSI, American National Standard, Public-Key Cryptography Using Reversible Algorithms for the Financial Services Industry (Draft)
(1994)
Draft Technical Corrigenda to Rec. X.500 I ISO/IEC 9594 resulting from Defect Reports 95941128, ISO!IEC JTC1/SC21
W. Ford (2008)
Computer communication security - principles, standard protocols and techniques
B. Kaliski (1993)
Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related ServicesRFC, 1424
(1993)
lnforfiUJtion Technology-Open Systems Interconnection-Specification of Abstract Syntax Notation One
J. Linn (1987)
Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication ProceduresRFC, 1421
To build effective public-key infrastructures, well-entrenched standards are essential because many different applications and different vendor products need to be supported and used. Standards for public-key certificate and certificate revocation list (CRL) formats are most important. The recognized standard in this area is ITU-T X.509, first published in 1988. In 1993, the Internet Privacy Enhanced Mail (PEM) proposals refined the use of X.509. However, more recently it has become apparent that there are several deficiencies in the X.509 formats and in the PEM refinements. Consequently, standards groups have undertaken an expedited activity to revise the X.509 formats by adding extensibility mechanisms and defining a set of standard extensions to satisfy a range of recognized needs. This paper outlines the status of this work as of mid-1995.
ACM SIGSAC Review – Association for Computing Machinery
Published: Jul 1, 1995
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.