Developing Secure Applications with Visual Basic (16)

Using Certificates with Encryption (96)
Digital Certificates Explained (128)
Acquiring Certificates (112)
Building a Certificate Request Utility (224)

Web Security & Commerce (8)

4.3 ActiveX and Authenticode (64)
III: Digital Certificates (64)
6.3 Problems Building a Public Key Infrastructure (56)
7.3 Server Certificates (136)
8.1 Client Certificates (144)

LDAP Programming with Java? (5)

Authenticating to the Directory (40)
Using Certificate-Based Authentication (35)
What's So Different about an Applet? (50)
Certificates and Signed Applets (120)
Writing LDAP Applets for Netscape Navigator (105)

Web Security, Privacy & Commerce, 2nd Edition (5)

7. Digital Identification II: Digital Certificates, CAs, and PKI (55)
7.1 Understanding Digital Certificates with PGP (40)
7.2 Certification Authorities: Third-Party Registrars (40)
7.3 Public Key Infrastructure (30)
7.4 Open Policy Issues (35)
12.3 Microsoft's ActiveX (50)
15.5 Secure Remote Access and Content Updating (5)

Special Edition Using Java? 2 Enterprise Edition (4)

Digital Certificates (128)
Encrypting Data (16)
Accessing the Keystore (28)

Malicious Mobile Code: Virus Protection for Windows (4)

5.5 Office 2000 Security (24)

Microsoft® Windows® 2000 Security Handbook (4)

Certificate Authorities (4)
Digital Certificates (96)
Windows 2000 and Public-Key Infrastructure (8)
Summary (52)
Cryptography and CryptoAPI (48)

Essential Guide to Computing, The (3)

Digital Signatures (219)
Test Your Understanding (48)
Glossary (33)

Active Server Pages 3.0 by Example (3)

Security Overview (240)
Using Certificates (54)
Request Object (6)

Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations (3)

Creating Stores on the Web, 2nd Edition (2)

Types of Payment and Acceptance (22)
Secure Electronic Transaction (SET) (28)
Implementing Encryption (120)
A Closer Look at ESD (30)

Designing Network Security (2)

Cryptography (12)
Key Management (76)
Security in TCP/IP Layers (14)
Public Key Infrastructure and Distribution Models (4)
Digital Signatures (88)

Outlook 2000 in a Nutshell (2)

5.5 Using Outlook's Editors (12)
15. Security and Encryption (30)
15.1 A Primer on Encryption (42)
15.2 Sending and Receiving Signed Messages (116)

Enhanced IP Services for Cisco Networks (2)

Basic IPsec Security Concepts and Cryptography (92)
Tying All of the Pieces Together: A Comprehensive Example with IPsec and IKE (22)
Configuring IKE (86)

Windows 2000 Active Directory (2)

6.4 Domain Namespace Design (194)
7.1 Intrasite and Intersite Topologies (2)
7.3 Examples (4)

Special Edition Using Microsoft Word 2002 (2)

Understanding and Using Word 2002's Privacy and Security Features (72)
Preventing and Controlling Word Viruses (94)
Troubleshooting (34)

Java Servlet Programming, 2nd Edition (2)

8. Security (104)
8.4 Digital Certificates (94)

XML and Java Developing Web Applications (2)

1.5 Why Use XML in Web Applications (74)
7.2 Transport and Message Formats (22)
7.5 Secure Message Exchange with SSL (102)

MCSE Windows 2000 Network Infrastructure (1)

Introduction (52)
Installing, Configuring, Managing, Monitoring, and Troubleshooting Certificate Services (36)
11. Practice Exam (12)

Internet Information Services Administration (1)

Client Certificate Mapping (54)
Server Certificates and Certificate Authorities (45)
Installing and Configuring Certificate Services (1)

Java Servlet Programming (1)

4.4 The Request (1)
8. Security (81)
8.2 Digital Certificates (17)
8.3 Secure Sockets Layer (SSL) (1)

Special Edition Using Microsoft Word 2000 (1)

Publishing Your Web or Intranet Site with Microsoft Internet Information Server (2)
Other Methods for Securing Documents (66)
C. What's on Que's Special Edition WOPR 2000 Pack CD (32)

MCSE Windows 2000 Directory Services Design (1)

Company Organization (1)
Windows 2000 Authentication (4)
Public Key Infrastructure (PKI) (17)

ASP in a Nutshell, 2nd Edition (1)

7.5 Collections Reference (100)

Special Edition Using Microsoft Project 2000 (1)

Macro Virus Protection Issues (56)
Putting It All Together (44)

Writing Apache Modules with Perl and C (1)

6.6 Authentication with the Secure Sockets Layer (100)

Special Edition Using Microsoft® Exchange 2000 Server (1)

The Windows 2000 Security Model (2)
Certificate Services (91)

Practical Firewalls (1)

Practical Applications for Cryptography on the Internet (97)
The IPSec Protocol Suite (3)

PHP and MySQL Web Development (1)

Digital Certificates (25)
Secure Web Servers (17)
Providing Secure Transactions (15)

PURE Java 2 (1)

16. Java Security (50)
Procedure for Digitally Signing Code (42)
java.security.cert Interface and Class Details (4)
java.security.cert Class Details (4)

Essential Guide to Home Networking Technologies, The (1)

HAVI SECURITY (100)

Maximum Security, Third Edition (1)

Windows 2000 (2)
Security Glossary (98)

(240) Security Overview (0789722402)

All a digital eavesdropper needs to do is to put the sniffing agent in place and write credit card information it discovers to a log file.

(224) Building a Certificate Request Utility (0672318369)

Building a Certificate Request Utility

(219) Digital Signatures (0130194697)

Digital Signatures

(194) 6.4 Domain Namespace Design (win2000ads)

Certificate authorities.

(144) 8.1 Client Certificates (websec)

A client certificate is a digital certificate that is designed to certify the identity of an individual.

(136) 7.3 Server Certificates (websec)

(128) Digital Certificates (0789725037)

Digital Certificates

(128) Digital Certificates Explained (0672318369)

Digital Certificates Explained

(120) Implementing Encryption (0201700050)

That requires getting an SSL-compliant server (most major servers are compliant) and applying to a certificate authority such as VeriSign or Nortel Entrust (see below for details) for the digital ID necessary for compliant browsers to register your site as valid.

(120) Certificates and Signed Applets (0201657589)

To understand how digital signatures work, you need to understand public-key cryptography.

(116) 15.2 Sending and Receiving Signed Messages (out2000ian)

With a digital certificate installed on your system, you can sign, encrypt, or sign and encrypt messages.

(112) Acquiring Certificates (0672318369)

Now that you have a basic understanding of how the process of acquiring and using certificates works, it's time to learn how to actually perform some of these tasks yourself.

(105) Writing LDAP Applets for Netscape Navigator (0201657589)

To use your applet with Netscape Navigator, you need to create a JAR file that contains the class files for your applet and the digital signatures for each class file.

(104) 8. Security (jservlet2)

Authentication, authorization, confidentiality, and integrity are all linked by digital certificate technology.

(102) 7.5 Secure Message Exchange with SSL (0201485435)

PKCS#7 applies to encryption envelopes and digital signatures and is a basis of S/MIME (Secure / Multipurpose Internet Mail Exchange).

(100) HAVI SECURITY (0130198463)

The basic security mechanism used to protect HAVi home networks from external threats is a digital authentication certificate.

(100) 6.6 Authentication with the Secure Sockets Layer (wrapmod)

When an SSL-enabled browser talks to an SSL-enabled server, they exchange cryptographic certificates and authenticate each other using secure credentials known as digital certificates.

(100) 7.5 Collections Reference (aspnut2)

The ClientCertificate collection of the Request object provides access to the certification fields of the client's digital certificate.

(98) Security Glossary (0672318717)

Methods of encoding voice into digital format over communication lines.

(97) Practical Applications for Cryptography on the Internet (0789724162)

Several important steps that have been taken toward standard methods include using digital signatures and digital certificates for authentication purposes, and the Secure Sockets Layer (SSL) protocol to enable secure Web traffic exchanges.

(96) Digital Certificates (0789719991)

Digital Certificates

(96) Using Certificates with Encryption (0672318369)

One of the biggest problems surrounding the use of public-key encryption algorithms is being able to verify that the public key you received is really from the person you want to send a secure message to.

(94) 8.4 Digital Certificates (jservlet2)

Digital Certificates

(94) Preventing and Controlling Word Viruses (0789725150)

Microsoft's approach to providing macro virus security does not focus on identifying viruses placed in macros but rather on providing tools for ensuring that users run macros from only those sources that can be trusted.

(92) Basic IPsec Security Concepts and Cryptography (1578701066)

As a countermeasure to the man-in-the-middle attack, the IKE protocol uses digital signatures to authenticate the origin of Diffie-Hellman exchanges.

(91) Certificate Services (078972278X)

Certificate Services

(88) Digital Signatures (1578700434)

Digital Signatures

(86) Configuring IKE (1578701066)

This is a simple configuration, does not use public key cryptography or digital certificates, and might be suitable for small networks.

(81) 8. Security (jservlet)

Authentication, confidentiality, and integrity are all linked by digital certificate technology.

(76) Key Management (1578700434)

A more scaleable approach is to use digital certificates to distribute public keys.

(74) 1.5 Why Use XML in Web Applications (0201485435)

One of its popular uses is for the X.509 digital certificate. (We discuss the X.509 digital certificate, authentication, and other security issues in

(72) Understanding and Using Word 2002's Privacy and Security Features (0789725150)

Support for digital signatures that confirm the identity of individuals who have created a document

(66) Other Methods for Securing Documents (0789718529)

Microsoft's approach to providing macro virus security does not focus on identifying viruses placed in macros, but rather on providing tools for ensuring that users run macros from only those sources that can be trusted.

(64) III: Digital Certificates (websec)

This part of the book explains what digital signatures and certificates are and how they can be used to establish identity and assure the authenticity of information that is delivered over the Web.

(64) 4.3 ActiveX and Authenticode (websec)

When the <OBJECT> tag is encountered by a web browser that implements the ActiveX protocol, the browser downloads the control, optionally verifies the control using a digital signature mechanism, loads it into the browser's address space, and executes the code.

(56) Macro Virus Protection Issues (0789722534)

As part of Microsoft's security policy, all Office programs (including Project) have a security certificate.

(56) 6.3 Problems Building a Public Key Infrastructure (websec)

Already, substantial commerce is occurring on the Internet based on old-style, easily forged credit cards, rather than high-tech digital signatures.

(55) 7. Digital Identification II: Digital Certificates, CAs, and PKI (websec2)

In the previous chapter, we explored three techniques for establishing and authenticating a person's identity: the use of paper documents, biometrics, and digital signatures.

(54) Client Certificate Mapping (0735700222)

Client Certificate Mapping

(54) Using Certificates (0789722402)

A common solution to ensuring user authenticity is to issue a client-side digital certificate.

(52) Introduction (0735709661)

In lieu of your "John Hancock" and sealing wax, you use a digital signature.

(52) Summary (0789719991)

The next step in a successful PKI is the concept of a Certificate Authority (CA).

(50) 16. Java Security (0672316544)

Creating a digital certificate

(50) 12.3 Microsoft's ActiveX (websec2)

By default, Internet Explorer will not run an ActiveX control that is not digitally signed with a public key that has a matching "software publisher's certificate."

(50) What's So Different about an Applet? (0201657589)

To sign an applet, you need a digital certificate that identifies you as a software publisher?an object-signing certificate.

(48) Test Your Understanding (0130194697)

Why is the idea of a digital certificate important to the expansion of e-commerce?

(48) Cryptography and CryptoAPI (0789719991)

Authentication in CryptoAPI is ensured by digital certificates, which are the digital equivalent of photo IDs.

(45) Server Certificates and Certificate Authorities (0735700222)

Server Certificates and Certificate Authorities

(44) Putting It All Together (0789722534)

You have now learned to record a macro, save the project file with a self-signed digital certificate, and use the Visual Basic Editor.

(42) Procedure for Digitally Signing Code (0672316544)

A digital signature is intended to provide some measure of confidence for the end user that code will not do bad things, based on the user's trust in the code signer.

(42) 15.1 A Primer on Encryption (out2000ian)

All forms of encryption?digital certificates, PGP, even the lowly password?comprise four distinct elements:

(40) 7.2 Certification Authorities: Third-Party Registrars (websec2)

A certification authority (CA) is any organization that issues digital certificates.

(40) 7.1 Understanding Digital Certificates with PGP (websec2)

Understanding Digital Certificates with PGP

(40) Authenticating to the Directory (0201657589)

Your client provides a digital certificate to the directory server as identification.

(36) Installing, Configuring, Managing, Monitoring, and Troubleshooting Certificate Services (0735709661)

Installing, Configuring, Managing, Monitoring, and Troubleshooting Certificate Services

(35) 7.4 Open Policy Issues (websec2)

At that time, there was already substantial commerce occurring on the Internet based on old-style, easily forged credit cards, rather than high-tech digital signatures.

(35) Using Certificate-Based Authentication (0201657589)

If you are connecting over SSL, you can use digital certificates to authenticate your LDAP client to the directory server.

(34) Troubleshooting (0789725150)

As you learned earlier in this chapter, Word allows you to add new trusted sources: sources whose digital certificates will certify that their macros can always be trusted.

(33) Glossary (0130194697)

for a primer on digital communications.

(32) C. What's on Que's Special Edition WOPR 2000 Pack CD (0789718529)

Some of the macros have been signed with a digital certificate to authenticate who the creator was.

(30) 15. Security and Encryption (out2000ian)

A digital certificate could have warned recipients of their misconceptions.

(30) A Closer Look at ESD (0201700050)

Before you can send a copy of that software to a customer via ESD, you must also have a secure version of the product that is packaged in a digital wrapper.

(30) 7.3 Public Key Infrastructure (websec2)

Public key infrastructure (PKI) is the system of digital certificates, certification authorities, tools, systems, and hardware that are used to deploy public key technology.

(28) Secure Electronic Transaction (SET) (0201700050)

The technology behind SET involves digital certificates?a way of verifying that a purchase is being made by a legitimate card holder.

(28) Accessing the Keystore (0789725037)

With keytool, you can create new keys, request a digital certificate, and manage a database of keys and certificates.

(25) Digital Certificates (0672317842)

Digital Certificates

(24) 5.5 Office 2000 Security (malmobcode)

Office 2000 introduced a new security feature, built around digital signatures, to diminish the threat of macro viruses.

(22) 7.2 Transport and Message Formats (0201485435)

The X.509 digital certificate, discussed later in this chapter, is en coded with ASN.1.

(22) Tying All of the Pieces Together: A Comprehensive Example with IPsec and IKE (1578701066)

Alice sends her digital certificate to Bob.

(22) Types of Payment and Acceptance (0201700050)

Electronic cash lets users send digital messages that act like currency to and from their accounts.

(17) Secure Web Servers (0672317842)

Using SSL on IIS involves simply installing IIS, generating a key pair, and installing your certificate.

(17) Public Key Infrastructure (PKI) (0735709831)

Another component of PKI includes digital signing.

(17) 8.2 Digital Certificates (jservlet)

Digital Certificates

(16) Encrypting Data (0789725037)

Also, if you are performing public-key encryption and you want to use the public key from a digital certificate, you can use the certificate as the key.

(15) Providing Secure Transactions (0672317842)

Registering for a digital certificate will protect our visitors from spoofing (someone else impersonating our site), allow us to use SSL without users seeing a warning message, and provide an air of respectability to our online venture.

(14) Security in TCP/IP Layers (1578700434)

Certificate selection.

(12) 11. Practice Exam (0735709661)

Prevent him from gaining access to your certificate server.

(12) 5.5 Using Outlook's Editors (out2000ian)

The Security section provides checkboxes for encrypting a message and/or attaching a digital signature to it.

(12) Cryptography (1578700434)

Instead, public key encryption algorithms are typically used in applications involving authentication using digital signatures and key management.

(8) Windows 2000 and Public-Key Infrastructure (0789719991)

Microsoft Certificate Server (discussed in

(6) Request Object (0789722402)

The ClientCertificate collection contains information about the digital security certificate on the client browser.

(5) 15.5 Secure Remote Access and Content Updating (websec2)

Examples are the SecurID system from Security Dynamics (see Figure 15-3) or the SecureNet Key from Digital Pathways.

(4) java.security.cert Class Details (0672316544)

Class Certificate

(4) java.security.cert Interface and Class Details (0672316544)

CodeSource (URL url, Certificate[] certs)

(4) Windows 2000 Authentication (0735709831)

A client may securely log on to Active Directory using the X.509 certificate PKI extensions of Kerberos by connecting to the front-end Web servers.

(4) 7.3 Examples (win2000ads)

However, DS-RPC is not the best replication mechanism for asynchronous links like these, so instead PetroCorp creates digital certificates and rolls out a certificate server to those sites to enable the replication mechanism to use the underlying mail transport via an SMTP Connector for each link.

(4) Public Key Infrastructure and Distribution Models (1578700434)

The purpose of a Public Key Infrastructure (PKI) is to provide trusted and efficient key and certificate management to support these protocols.

(4) Certificate Authorities (0789719991)

Certificate Authorities

(3) The IPSec Protocol Suite (0789724162)

For purposes of authentication, digital certificates are used.

(2) Windows 2000 (0672318717)

PKI makes use of Microsoft Certificate Services, allowing the deployment of enterprise certificate authorities (CA) in your enterprise and is integrated into Active Directory.

(2) The Windows 2000 Security Model (078972278X)

The Kerberos service issues a certificate that Windows 2000 uses to authenticate a client on the network whereby that client can access resources anywhere in the enterprise using a single logon and password.

(2) Publishing Your Web or Intranet Site with Microsoft Internet Information Server (0789718529)

Certificate Server.

(2) 7.1 Intrasite and Intersite Topologies (win2000ads)

SMTP Connector messages are encrypted using digital signatures, so to encrypt the messages, you need to install the optional Windows 2000 Certificate Server service and obtain your own digital signature for your organization.

(1) Company Organization (0735709831)

The digital nervous system, Microsoft's initiative to digitize the DNA of a company, presents us with an interesting view of vendor, partner, and customer relationships, as well as employee-to-employee relationships.

(1) 8.3 Secure Sockets Layer (SSL) (jservlet)

The browser checks to see whether a trusted certificate authority signed the key.

(1) 4.4 The Request (jservlet)

out.println ("Client Certificate [" + i + "] = "

(1) Installing and Configuring Certificate Services (0735700222)

Installing and Configuring Certificate Services