๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

User authentication, VPN in an appliance

โœ Scribed by Helen Meyer


Book ID
104297955
Publisher
Elsevier Science
Year
1997
Tongue
English
Weight
126 KB
Volume
16
Category
Article
ISSN
0167-4048

No coin nor oath required. For personal study only.

โœฆ Synopsis


cation, extranets for inter-company communications, and electronic commerce applications. PKIs will possibly be the foundation for a new generation of remote access,Virtual Private Networking (VPN), and businesscritical applications. A PKI is a dynamic system, the underlying framework that makes security technologies work together. In most cases, it will include digital certificates and public-key algorithms, integrating them with access-control policies and directories and allowing someone within the company or at a third party service to manage, control and modify policies on an asneeded basis. PKI may prove to be the wedge that breaks the Internet commerce logjam. It could be a powerful tool for enabling secure communications and data processing into the next century. But right now network managers and their organizations must forge strategies and educate themselves about their goals for the PKI, products they will use to build it, and how to use and deploy PKI-enabled applications. IANTimes, October 13, 1997, p. 50.


๐Ÿ“œ SIMILAR VOLUMES


Enabling the User: The VPN in Context
โœ William Box; Keith Sterling ๐Ÿ“‚ Article ๐Ÿ“… 2001 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 151 KB

## Despite the growth of IP-VPN capabilities too little attention has been paid to date to other key enterprise trends such as the increasing use of other virtual services and the growing use of enterprise directories. As the nature and number of relationships between the enterprise and the servic