91. Malpani A., Hoffman P., Housley R,
Simple Certificate Validation Protocol (SCVP) Internet Draft November 2000,92. ,
Minimum Interoperability Specification for PKI. Components, Version 2 - Second DRAFT, 2000. NIST PKI Project Team93. Needham R. Schroeder M, Using Encryption for Authenticating in Large Networks of Computers, Coomunications of the ACM, vol. 21, no. 12, 1978, p. 995-999
94. ,
OASIS PKI Resources,95. ,
OASIS Security Services (Security Assertion Markup Language - SAML) TC,96. Olnes J., Verdier M., Ganivet N., Maillot D., Skretting J,
Public Key Infrastructure and Certification Policy for Interdomain Management,97. Perlman Radia,
An Overview of PKI Trust Models,98. ,
PGP User's Guide, Volume I: Essential Topics,99. ,
PKI Interoperability Framework. PKI Forum White Paper,100. Polk W.T., Hastings N.E., Malpani A,
Public Key Infrastructures that Satisfy Security Goals,101. Polk W.T., Hastings N.E,
Bridge Certification Authorities: Connecting B2B Public Key Infrastructures, NIST,102. ,
Public-Key Cryptography Standards, RSA Laboratories,103. ,
Public Key Infrastructure. Request For Proposal. Object Management Group Document: ec/99-01-15,104. ,
Public Key Infrastructure Standards,105. Raina K, PKI Security Solutions for Enterprise: Solving HIPAA, E-Paper Act, and Other Compliance Issues, Wiley Publishing, Inc., 2003
106. Reese A,
The Architecture of Privacy, 2004107. ,
Request for Proposals for Certification Authority and Public Key Infrastructure Services, Office of the Secretary of Kansas State. Draft copy, 2001108. ,
Secure Network Time Protocol (stime),109. ,
Secure Socket Layer (SSL) 3.0 Specification,110. ,
Securities Industry Root. Certificate Authority (SIRCA),111. ,
Security Assertion Markup Language (SAML),112. ,
Security Service API: Cryptographic API Recommendation Second Edition, NSA Cross Organization CAPI Team July 1, 1996113. ,
SET Secure Electronic Transaction Specification. Book 1: Business Description, May 31, 1997114. ,
SET Secure Electronic Transaction Specification. Book 2: Programmer's Guide,115. ,
SET Secure Electronic Transaction. Specification. Book 3: Formal Protocol Definition, May 31, 1997116. Slagell A.J, Bonilla R,
PKI Scalability Issues,117. ,
Standard for Entity Authentication Using Public Key Cryptography, FIPS 196 - Federal Information Processing Standard Publication 196, 1997118. Stapleton J,
CA Trust, A PKI Forum Note, July 2001119. ,
Synopsis of PKI and Related Standards, The Center For Information Technology Stan-dards, 2000120. ,
Time Signing, Symmetricom Trusted Time,121. Turnbull J,
Cross-Certification and PKI Policy Networking August 2000 Version: 1.0,122. ,
Understanding Public Key Infrastructure (PKI), Technology White Paper, PKI WP 0999, RSA Security Inc., 1999123. ,
What Are CA Certificates?,124. ,
What is meant by trust?,125. ,
WHAT IS SESAME?,126. ,
X.500: Directory Access Protocol (DAP),127. ,
X.500 Directories Part 2-Core Directory Information Tree and Schema Guideline,128. ,
X.509 Certificate Policy. for the. E-Governance Certification Authorities, Version 1.3 9 November 2005