Sorry! The requested paper could not be found.
Featuring 4 Papers as of March 27, 2014
Building and Managing a PKI Solution for Small and Medium Size Business Masters
Wylie Shanks - March 27, 2014
The use of Public Key Infrastructure (PKI) can be an effective way to meet business, regulatory, and compliance requirements.
Who do you trust?
Matthew Luallen - August 3, 2011
While certificates have their uses in a security regimen, they are not a bullet-proof method to ensure the authenticity of software, a person, or communications.
Security Alert: Fraudulent Digital Certificates
Ferdinand Gomes - October 31, 2003
Digital certificates are critical for businesses and customers who download patches, updates and various other forms of software from the Internet.
What Secure Site Seals Mean to Consumer
Kwok Chan - October 31, 2003
We definitely trust brandname and is the key to locate the merchant in the great internet world of web sites.
Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact firstname.lastname@example.org.
All papers are copyrighted. No re-posting or distribution of papers is permitted.