The control implications of a public key infrastructure
dc.contributor.author | Bouwer, A.M. | |
dc.date.accessioned | 2007-12-12T06:59:07Z | |
dc.date.available | 2007-12-12T06:59:07Z | |
dc.date.issued | 1999 | |
dc.description.abstract | Organisations continuously have to question traditional thinking and implement state of the art systems to control e-commerce applications. A Public Key Infrastructure (PKI) has established itself as the generally accepted method to control e-commerce transactions. This infrastructure comprises complex technology supported by specific manual and electronic control procedures. In the e-commerce realm, auditing professionals are increasingly challenged with new technologies and different methodologies such as PKI. This article examines the inherent risks associated with implementing a PKI and gives guidance on control appropriate control measures. | en |
dc.format.extent | 82663 bytes | |
dc.format.mimetype | application/pdf | |
dc.identifier.citation | Bouwer, A 1999, 'The control implications of a public key infrastructure', Southern African Journal of Accountability and Auditing Research, vol. 2, pp. 67-71. [http://www.saiga.co.za/publications-sajaar.htm] | en |
dc.identifier.issn | 1028-9003 | |
dc.identifier.uri | http://hdl.handle.net/2263/4067 | |
dc.language.iso | en | en |
dc.publisher | Southern African Institute of Government Auditors | en |
dc.rights | Southern African Institute of Government Auditors | en |
dc.subject | Audit | en |
dc.subject | e-Commerce | en |
dc.subject | Control | en |
dc.subject | Public key infrastructure | en |
dc.subject | Digital signature | en |
dc.subject | Digital certificate | en |
dc.subject | Public key cryptography | en |
dc.subject | Public key | en |
dc.subject | Private key | en |
dc.subject.lcsh | Public key infrastructure (Computer security) | |
dc.subject.lcsh | Electronic commerce | |
dc.subject.lcsh | Auditing | |
dc.title | The control implications of a public key infrastructure | en |
dc.type | Article | en |