dc.contributor.author |
Bouwer, A.M.
|
|
dc.date.accessioned |
2007-12-12T06:59:07Z |
|
dc.date.available |
2007-12-12T06:59:07Z |
|
dc.date.issued |
1999 |
|
dc.description.abstract |
Organisations continuously have to question traditional thinking and implement state of the art systems to control e-commerce applications. A Public Key Infrastructure (PKI) has established itself as the generally accepted method to control e-commerce transactions. This infrastructure comprises complex technology supported by specific manual and electronic control procedures. In the e-commerce realm, auditing professionals are increasingly challenged with new technologies and different methodologies such as PKI. This article examines the inherent risks associated with implementing a PKI and gives guidance on control appropriate control measures. |
en |
dc.format.extent |
82663 bytes |
|
dc.format.mimetype |
application/pdf |
|
dc.identifier.citation |
Bouwer, A 1999, 'The control implications of a public key infrastructure', Southern African Journal of Accountability and Auditing Research, vol. 2, pp. 67-71. [http://www.saiga.co.za/publications-sajaar.htm] |
en |
dc.identifier.issn |
1028-9003 |
|
dc.identifier.uri |
http://hdl.handle.net/2263/4067 |
|
dc.language.iso |
en |
en |
dc.publisher |
Southern African Institute of Government Auditors |
en |
dc.rights |
Southern African Institute of Government Auditors |
en |
dc.subject |
Audit |
en |
dc.subject |
e-Commerce |
en |
dc.subject |
Control |
en |
dc.subject |
Public key infrastructure |
en |
dc.subject |
Digital signature |
en |
dc.subject |
Digital certificate |
en |
dc.subject |
Public key cryptography |
en |
dc.subject |
Public key |
en |
dc.subject |
Private key |
en |
dc.subject.lcsh |
Public key infrastructure (Computer security) |
|
dc.subject.lcsh |
Electronic commerce |
|
dc.subject.lcsh |
Auditing |
|
dc.title |
The control implications of a public key infrastructure |
en |
dc.type |
Article |
en |