Re: Killer PKI Applications

2000-01-12 Thread Lynn . Wheeler
eter Cassidy" <[EMAIL PROTECTED]>, [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: Re: Killer PKI Applications . While this would certainly be an interesting goal to achieve, I think it's worth remembering that current software industry practice is for th

Re: Killer PKI Applications

2000-01-12 Thread Greg Broiles
At 05:00 PM 1/11/00 , [EMAIL PROTECTED] wrote: >For the CA-based trust infrastructure to work for this scenerio ... the CA >needs >to be asserting the trust/quality/integrity of applications produced by each >software company (so that I only need to record CA-level trust decisions) ... >once I ne

Re: Killer PKI Applications

2000-01-11 Thread Lynn . Wheeler
eter Cassidy" <[EMAIL PROTECTED]>, [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: Re: Killer PKI Applications > Once the user decides not to trust the CA as to whether programs from individual > vendors are to be accepted ... then the user creates their ow

Re: Killer PKI Applications

2000-01-11 Thread Lynn . Wheeler
, [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] cc:(bcc: Lynn Wheeler/CA/FDMS/FDC) Subject: Re: Killer PKI Applications The killer app should make somebody very rich. Perhaps where the consumer can make an online purchase, same as now with an SSL browser link, but they

Re: Killer PKI Applications

2000-01-11 Thread bram
Peter Cassidy <[EMAIL PROTECTED]> on 01/10/2000 wrote > > I am engaged in an expansive and challenging authoring assignment > regarding PKI's rationale in the large e-commerce plexus. I'm casting > about for ideas on the killer PKI application. I'd like to hear any ideas > - however wild or domes

Re: Killer PKI Applications

2000-01-11 Thread Lynn . Wheeler
MAIL PROTECTED], [EMAIL PROTECTED] Subject: Re: Killer PKI Applications The first thing something needs to be a killer application is to be an application. The problem with PKI is that it isn't an application, it's a system. A killer app needs to have a very specific purpose, and needs

Re: Killer PKI Applications

2000-01-11 Thread Lynn . Wheeler
the original design point for much of PKI was distributed credentials for non-face-to-face, offline, electronic ... i.e. parties that had no prior business relationship and at the moment performing authentication function the relying party wasn't online (analogous to letters of credit in the da

Re: Killer PKI Applications

2000-01-11 Thread Eivind Eklund
On Mon, Jan 10, 2000 at 06:08:00PM -0500, Peter Cassidy wrote: > > Friends, > > I am engaged in an expansive and challenging authoring assignment > regarding PKI's rationale in the large e-commerce plexus. I'm casting > about for ideas on the killer PKI application. I'd like to hear any ideas >