O'Reilly logo

Operating Systems: Concurrent and Distributed Software Design by Tim Harris, Jean Bacon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

8.6. Examples

In this section we describe some well-known and widely used security protocols and packages. The basic building blocks, discussed in general above, are used as required in these packages and may be thought of as a 'security toolkit'.

8.6.1. X.509 certification

X.509 is the most widely used standard form for certificates (CCITT, 1988b). It was originally designed as part of the X.500 standard (CCITT, 1988a) which addresses the construction of directories of names and attributes for large-scale distributed systems. X.500 defines globally unique names, a topic we discussed in Section 7.7. X.509 certificates have come to be used in cryptography for self-standing certificates. An X.509 certificate's primary role is to bind a public key ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required