Various applications will often require different validation techniques, depending on the application’s security policy. This section outlines a typical set of steps involved in validating a certificate, but it is not an exhaustive catalog of the possible methods that can be used. X.509 certificate validation is a complex process and can be done to several levels of confidence. Terence Spies, in Computer and Information Security Handbook, 2009 5.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |