[Previous] [Next] [Index] [Thread]

what are realistic threats?



Just to comment a bit further on the issue of certificates, the
importance of public key certificate management/interpretation cannot
be emphasized enough, especially as digital signatures begin to play
an increasing role in electronic commerce.  This begs the question as
to how certificates are obtained and validated, given the potential
need for certificate revocation (e.g. a key pair is compromised, or
routinely changed, or ...).  In the absense of an on-line certificate
service, I'm not convinced that the approach of using certificate
revocation lists (CRLs) will be adequate for on-line electronic
commerce applications, at least with respect to the timeliness of the
CRL information and the efficiency with which it can be processed.

Others' comments on this issue?

- Doug



Follow-Ups: References: