|
About
Join
Governance
Members
Resources
White Papers
FAQ
IPR Policy
TC Process
Current TC List
PKI
OASIS
CGM Open
DCML
ebXML
LegalXML
UDDI
Cover Pages
XML.org
Sponsorship
|
|
Introductions to Public Key Security and PKI
|
|
Fundamentals in Authentication and Identity Management
|
|
Assorted PKI Business Issues
|
|
Vertical Industry Experiences
|
|
Government Service Delivery |
Contemporary PKI Strategy
|
|
Implementation Guidelines
|
|
Policy or Compliance Related Guidelines |
Project Management Guidelines |
PKI Workshop Summary and Recommendations - Burton Group 2002. The Burton Group was retained by Cornell University to conduct a workshop into Cornell's enterprise PKI requirements and develop a set of recommendations. RISK APPS |
Advanced Engineering Resources |
Cryptography Papers of Special Interest in Practical PKI |
Hash Functions Implications - November 2004 Recent cryptanalytic results have raised concerns regarding currently popular hash algorithms; this NIST presentation outlines the practical implications. Concludes that MD5 must no longer be used, but that SHA-1 continues to be safe. |
Assorted PKI Technology Topics
|
|
Product Specific guidelines |
Biometrics PKI Note - APPS |
Will Biometrics Obsolete PKI? A Special Report - June 2001 American Bar Association, Bulletin of Law/Science & Technology. This short paper discusses unique properties of PKI not provided by biometrics, including the ability to revoke when compromised, persistent signatures, and the ability to build open authentication systems. BENEFITS RISK |
Miscellaneous Applications |
PKI Governance and Legal Issues
|
|
Interoperability and Recognition |
Regulatory and Legislative Issues |
See also the collection of links to state, federal and international electronic signature laws below. |
International Experience and Developments
|
|
|
|
|
|