Date Published: February 26, 2001 
            
            
            
            
            
            
            
			
			
            
            
            
            
            
            
			
            
            Author(s)
            Richard Kuhn (NIST), Vincent Hu (NIST), W. Polk (NIST), Shu-jen Chang (NIST)
            
            
            
            
            
                
                
                    This publication was developed to assist agency decision-makers in determining if a PKI is appropriate for their agency, and how PKI services can be deployed most effectively within a Federal agency. It is intended to provide an overview of PKI functions and their applications. Additional documentation will be required to fully analyze the costs and benefits of PKI systems for agency use, and to develop plans for their implementation. This document provides a starting point and references to more comprehensive publications.
                
                
                    
                    
                        This publication was developed to assist agency decision-makers in determining if a PKI is appropriate for their agency, and how PKI services can be deployed most effectively within a Federal agency. It is intended to provide an overview of PKI functions and their applications. Additional...
                        
See full abstract
                    
                        This publication was developed to assist agency decision-makers in determining if a PKI is appropriate for their agency, and how PKI services can be deployed most effectively within a Federal agency. It is intended to provide an overview of PKI functions and their applications. Additional documentation will be required to fully analyze the costs and benefits of PKI systems for agency use, and to develop plans for their implementation. This document provides a starting point and references to more comprehensive publications.
                        Hide full abstract
                     
                Keywords
 certificates; digital signatures; PKI; public key infrastructure
            
 
            
            Control Families
            
                
                
                    Identification and Authentication; 
                
                    Planning; 
                
                    Risk Assessment; 
                
                    System and Communications Protection;