A system for securely exchanging information. It includes a method for publishing the public keys used in public-key cryptography and for keeping track of keys that are no longer valid.
PKI) The standards and services that facilitate the use of public-key cryptography and X.509 v3 certificates in a networked environment.
An interoperable security solution incorporating the use of digital signatures to ensure the integrity of transmitted information. Also supports user authentication and non-repudiation.
(Advanced Security Administrator's Guide; search in this book)
Information security technology utilizing the principles of public key cryptography. Public key cryptography involves encrypting and decrypting information using a shared (public) and private key pair. Provides for secure, private communications within a public network.