Abstract
In the previous chapter we introduced CSPs that manage the life cycle of certificates in a hierarchical PKI. CSPs follow certain rules which are called certificate policies. They determine the applicability of a certificate to a particular community or class of applications with common security requirements. Therefore, certificate policies that a CSP applies while generating and managing certificates are made explicit and available to the certificate users. In addition, the CSP may describe the implementation of the policy in a certification practice statement (CPS). In this chapter we discuss certificate policies and certification practice statements.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
CA/Browser Forum, http://www.cabforum.org/
S. Chokhani, W. Ford, R. Sabett, C. Merrill, S. Wu, Internet X.509 public key infrastructure certificate policy and certification practices framework, in IETF Request for Comments, 3647, Nov 2003
D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, W. Polk, Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile, in IETF Request for Comments, 5280, May 2008
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Buchmann, J.A., Karatsiolis, E., Wiesmaier, A. (2013). Certificate Policies. In: Introduction to Public Key Infrastructures. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40657-7_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-40657-7_8
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40656-0
Online ISBN: 978-3-642-40657-7
eBook Packages: Computer ScienceComputer Science (R0)