Примеры использования Public key infrastructure на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
certificate signing, and general public key infrastructure and certificate configuration principles.
there are some difficulties of digitally signed documents depending on NPKI National Public Key Infrastructure.
Setting up a public key infrastructure(PKI) is a way to provide confidence that:(1)
The Public Key Infrastructure implemented by Statistics Canada uses certificates that are installed on the respondent's workstation for the duration of a web session to encrypt the information before it is transmitted across an electronic network using an SSL session.
This means in practice that legislation based on this Model Law may recognize both digital signatures based on cryptography(such as public key infrastructure- PKI)
electronic signatures and public key infrastructure(referred to here as"PKI")
of registration certificates and instructions on use of registration certificates of public key infrastructure in accordance to the standard X.509“Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework”
which were being used in commercial transactions, such as digital signature techniques within a public key infrastructure PKI.
in particular digital signatures under a public key infrastructure PKI.
based on PKI(public key infrastructure), enables digital identification of the identity,
The function of the trusted root key is somewhat like a root certificate in a public key infrastructure in that anything signed by the private key of the trusted root key is trusted further down the hierarchy.
private individuals e.g. through the re-use of certificates in the public key infrastructure PKI.
including adoption of the Model Law, electronic signatures and public key infrastructure(referred to here as"PKI")
administrators can use certificate trust policy to enhance their control of certificate use and public key infrastructure performance by using certificate path validation options.
There are also multiple proprietary public key infrastructure systems which maintain key servers for their users;
In addition to the servers that host the services required for the public key infrastructure, this secure staging area contains the data base
data protection is increasing, administrators can use certificate trust policy to enhance their control of certificate use and public key infrastructure performance by using certificate path validation settings.
to performing commercial transactions over the Internet, including the creation of technology-neutral taxation, the development of policies on cryptography and public key infrastructure, the development of guidelines to protect consumers and legislation to protect personal information.
Law on Electronic Commerce, electronic signatures and public key infrastructure(hereinafter referred to as“PKI”)
However, a concern was expressed that Variant A failed to recognize the different ways in which a public key infrastructure might be implemented(e.g.,