Abstract: "Building on a richer conception of authentication than has been used to date, a statement of requirements is expressed for public key infrastructure (PKI) to support e-business. Inadequacies inherent in conventional PKI are underlined, providing important reasons for its continued low take-up rates. Alternative approaches to electronic authentication are evaluated against the requirements." Contents: * 1. Introduction * 2. The New Model of Authentication * 3. What Public Key Technologies Do, and Don't Do * 4. Requirements of an Effective PKI * 5. Conventional PKI * 6. Alternative Approaches to PKI * 7. Conclusions * Appendix 1: Elements of a PKI to Support Digital Signatures * References |