Public Key Infrastructure

RESOURCES

1. Lareau, Patricia. "PKI Basics - A Business Perspective." Oasis PKI. N.p., Apr. 2002. Web. Dec. 2016..

2. Bradbury, Danny. "Why Public Key Infrastructure Is a Good Idea." Why Public Key Infrastructure Is a Good Idea. Computer Weekly, Feb. 2001. Web. 18 Dec. 2016. .

3. Kiran, Shashi, Patricia Lareau, and Steve Lloyd. "PKI Basics - A Technical Perspective." PKI Note. Oasis PKI, 1 Nov. 2002. Web. 16 Dec. 2016. .

4. Moses, Tim. "What's Next for PKI? - Entrust, Inc." Entrust, Inc. Entrust, 2015. Web. 07 Dec. 2016. < https://www.entrust.com/whats-next-for-pki/>.

5. Fisher, Dennis. "Final Report on DigiNotar Hack Shows Total Compromise of CA Servers." Threatpost English Global. N.p., 31 Oct. 2012. Web. Dec. 2016. .

6. Research. (2016, December). Retrieved December 07, 2016, from https://www.csssecurity.com/research/

7. Comodo Group. (n.d.). Retrieved December 07, 2016, from https://en.wikipedia.org/wiki/Comodo_Group

8. Donna. (2009, May 18). Donna's SecurityFlash. Retrieved December 07, 2016, from http://blogs.msmvps.com/donna/2009/05/18/microsoft-mvp-mike-burgess-respond-tocomodo-s-ceo-on-comodo-certificates-issued-to-malware-distributors/

9. Symantec. (n.d.). Retrieved December 07, 2016, from https://en.wikipedia.org/wiki/Symantec

10. Khouri, Ali M. Al. "PKI in Government Identity Management Systems." International Journal of Network Security & Its Applications 3 (): 69-96. Web. 16 Dec. 2016. .

11. Wilson, Stephen. "The Importance of PKI Today." China Communications. http://www.chinacic.org.cn/english/digital%20library/200512/3.pdf (accessed Dec 16, 2016).