Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Public Key Infrastructure (PKI)

Handbook of Research on Mobility and Computing: Evolving Technologies and Ubiquitous Impacts
A set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates.
Published in Chapter:
Extending the Scope of eID Technology: Threats and Opportunities in a Commercial Setting
Vincent Naessens (Katholieke Hogeschool Sint-Lieven, Belgium) and Bart De Decker (Katholieke Universiteit Leuven, Belgium)
DOI: 10.4018/978-1-60960-042-6.ch076
Abstract
In 2002, Belgium has adopted an electronic identity card as one of the first countries in Europe. By the end of 2009, the roll-out of the eID card will be completed. This means that each Belgian citizen will possess an eID card. The card enables her to digitally prove her identity and to legally sign electronic documents. The Belgian eID card opens up new opportunities for the government, its citizens, service providers and application developers. The Belgian eID technology originally aimed at facilitating transactions between Belgian citizens and the government. Although many eID applications have been developed, the success of the Belgian eID technology has not been what was expected. Therefore, the Belgian government encourages developers to build commercial applications that use the eID card (for authentication or e-signatures). However, extending the scope of the Belgian eID technology from e-government to the commercial sector is no sinecure and not without risks.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Trust Management and User’s Trust Perception in e-Business
Set of mechanisms providing means to create and manage credentials and digital signatures.
Full Text Chapter Download: US $37.50 Add to Cart
Authentication
A set of technological means and management procedures that allows a third party to guarantee one entity identity.
Full Text Chapter Download: US $37.50 Add to Cart
Overview of OMA Digital Rights Management
A collective name for everything needed to perform public key cryptography, including certificates, issuing authorities, public and private key pairs, and revocation mechanisms.
Full Text Chapter Download: US $37.50 Add to Cart
Virtual Private Networks
The supporting programs and protocols that act together to enable public key encryption/decryption.
Full Text Chapter Download: US $37.50 Add to Cart
Grid Computing for Social Science
A secure means of sending data over a public network, encrypting it on transmission with the recipient’s public key and decrypting it on arrival with the recipient’s private key.
Full Text Chapter Download: US $37.50 Add to Cart
The German Electronic Identity Card: Lessons Learned
Infrastructure for the authentication of public keys used in digital signature schemes and/or for the encryption of data. Public keys are usually authenticated by trusted certification authorities, which use digital signature schemes to confirm the mapping between a public key and the identity of its owner.
Full Text Chapter Download: US $37.50 Add to Cart
Authentication, Authorisation, and Access Control in Mobile Systems
PKI is a service that acts as a trusted third party, manages public keys, and binds users to a public key.
Full Text Chapter Download: US $37.50 Add to Cart
Policy Frameworks for Secure Electronic Business
The architecture, organization, techniques, practices, and procedures that collectively support the implementation and operation of a certificate-based public key cryptographic system.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR