November 1999
Intermediate to advanced
320 pages
8h 46m
English
Chapters 3 and 4, along with this chapter, have described an architecture for what may be called the comprehensive PKI (see Figure 5.1). That is, components, functions, and services have been defined for a PKI that would, in some abstract sense, be "perfect" because it would satisfy the requirements of virtually every environment. Specific environments would "turn off" (or not install) the pieces they did not need in order to tailor this generic solution to their particular problems of interest.

The comprehensive PKI is a vision of what the future may hold; it does not describe ...