Académique Documents
Professionnel Documents
Culture Documents
Book PKI
Book PKI
() *+
, , - .* / 0 1
&
2 3 4 5
.................................................................................... 777777777777777777777777777777777777 . 6
77777777777777777777 . 6
, , - =
8; M;4
4!
, , 4
</ 2 A P4 B e 2
2 4!
, , - ( < 4 (>
, , - + >?@ 1
D - 9 C' BA = ( <
- <G H : F 5- 1 > E1
?A
49=f ./
b c4
>A 3 <'A . - :$4 ?A $3 .
(< D ; 6 (PKI) (< I 4A 1
>LM 1 * K > J (< I 4A 1 /+
J'87 'A $I
h g ': $J !
': f J
-$33 A V 6
h g ': 2. . $3.
h g ': 4 " RAB ' . $3.
':
h g -$)R6 ': 2
S 2Q ,
>'
77777777777777777777 . 6
P4@ Q , , >
, , > <
* , , > > 8,
, , > > O
Client Authentication Certificate 2-5-1)
E-mail Protection Certificate
Server Authentication Certificate
Code Signing Certificate 2-5-4)
Time Stamp Signing Certificate 2-5-5)
IPSec Certificate 2-5-6)
, , > - R .A Q 41 1
, , IC >L R , , > > > = O 1 >. (
(Identity Management)
(Identity Management) %$ "#$ !
+ *- %# , # ()!# *("+ !& ' 2-7-3)
()!# *("+2 %+ (!'# " ./01
()!# *("+45)'./01 3
4: 09# 7 ) 89./01 6
()!# *("+ < # + ;'./01
()!# *("+ "#$ ./01 =
? !+ @0 1 ./01 >
IC > ' , , > > = 1 >. (
A =
UK Oil Portal 2-8-2)
HH3G E FB +C!D " + 2-8-3)
"+ =
)"+* + 3 =
&/
+! 4 '+ 2-9-1)
, , F
(< (CA) , , > / ?1 + 4 (>
. 6
' , , > S&
, , - .* /
.' 1 , , > /
U =T N < , , > /
<4 % - :j. ! >4 i.' 4 R Z ': K '
h : gS ': $J ! $7 '8( , B
!"#X W 9 , , - D V
, , - D VU"XT L 1 + . 1
, , > / > Y 1 + 8 (*
U ; C =T ' (< I 4A 1 D (H Z 3 L %
........................................................................................ [ + [= 4 5
: +4 5
................................................................................. 2 $34 , ek kR )
............................................................ )23 AB :q 3 B em kR )
................................................................... ) ^IO S % I ep kR )
.......................................... . A </ FE (PKI) 'A $ I 27 . 4 er kR )
........................................................ $3 , PKI 4 ! 4 'A es kR )
..................................... hInternet Explorer : F4 A g ': e
..... hInternet Explorer : F4 A g ': Details 2A Z - e
......... $ -$) - 7n f8 A) . ': -$ % ep mR )
................ $ -$) - 7n f8 A) . ': -$ % er mR )
.......................................................(purpose) ': - Y . ' 3 es mR )
........................................................................... ': f J S et mR )
.......................................................................... ': u4 el mR )
.......................................................................... ': u4 eq mR )
.......................................................................... ': u4 eo mR )
.......................................................... h ': - f8 S$ g j 3) ': ekv mR )
..................... Certification Path 2A Z j 3) ': w' S H = -$ % ekk mR )
.......... S ': $J ! ': - f8 e
............................................................. h u4 S A g -$) TE3 ': ekp mR )
...................................................................................... -$) D O ': ekr mR )
.................... Mozilla Firefox : $ SSL (YJ w' H eks mR )
............... Internet Explorer 8 : $ SSL (YJ w' H ekt mR )
.................................................................................. SSL ': -$ % ekl mR )
...................................................... ': 3. C'87 3 $% ekq mR )
..................................... $J ^" ': 3. C'87 3 $% eko mR )
....................................................................... ': 7 G emv mR )
.........................................................................................< E 4 '+ emk mR )
............................................ < E +! 4 '+ ' $ I $B emm mR )
....................................................................................... < E 4 '+ emp mR )
........................................................ </ -$ G S = ' ( > B < S$ emr mR )
.......................................................................... S = -$ G < ' < 4 ems mR )
................................................................................... S = X4 T $ emt mR )
.............................................................. </ 3. S = X4 T $ eml mR )
........................................................................ S = X4 + ! T $ emq mR )
............................ A ' (CA) ': $J ! X4 '" 2 A emo mR )
. 6
1
. Clinton and Gore
2
. Millar
3
. Credit Card
4
. Debit Card
A $J @3 '% X /56 2. >4 *$ F4 !, F = F
$4 7 D E. : S 34 'J < F3
4 < R4 A S$ 2I 2. >4 ') [O '. *2. )$ $3G F4 !,
S z$ 34 $4 7 S 4 ' -'E 'J z 4 <4 % @
4! b I '" I4 G U2 G
U$33 A D E . 'J $4 7 < 4 %
Q' R ' B.' ^ ' ' . . $B F W=
5 B.' I ' >4 A@ 4 *2. -$) S 2 E,' B.'
k
kooo D . 2{ *$) A 2. -$) 7 3) Q' 2 E,'
A D ^ kv > *2. - 1 !: -$ ^ ' >4 @
m
A|||| S$ *hmvvp F A 2 ' RE g 2. -$) 1 !: ^ > '. < '3
<$) : <$) &9" 2@" , ') ^ ' 4 < '3
-$) ||||7 3) 34 < :$3) , 8;) ?6 4 </ w' F|||3
*hmvvs p>4 ' } g 2.
. - / 4 NO. ? B <4 % @3 A|||| "
hmvvk r G 24 X g |. V 6 @/ i.' -$) ~ X| 4 < 3 A6 S$ I
*hmvvl s• >Gg $ F4 !, |||| $4 7 R4 A
t
'G G ^Z A 4 ! 4 < '3 (PKI) 'A $ I 27 . 4
>4 *$3 , ': < R6 !A D 3 ^4 ' $ ' 27 .
V 6 $3 - Y. ': $J ! -$) J aD 4 ': 27 . 4
*$4 A 54$8 !A F3 X4 :
- : ': 7 ?6 3, >4 A@ +4 4
< , 3B 2 S'@Y 2. ,: Z . ' , % = ^ '"
4 2 B, ' 3 > A *2. F; $7 Q' f. 3 €4 2@" S
- Y. 2 *2. , 49= 'J 2 €B.' '% fIb
f. 3 . . 2@" S ?@ , ') \?6 ?6 3, 2
1
. CommerceNet
2
. Corbitt
3
. Wang & Emurian
4
. McKnight & Chervany
5
. Chen & Barnes
6
. Public Key Infrastructure
2 % - : 2J , • $7 2 Y [?J $7 ?6
4. T, C 7 2 R . $3 O . . A " PI ; @ B, $34 ,
, 24' 54$8 4 . 3) 3 4 FG 2 .- = 2
'A $ I 27 . 4 *$3 "' ?6 >A4 D ?6 + ( 2. '7
7 = @/ & >4 $ 4 4 '9 FG + A ^,
*2. -$)
PKI
0()* +),-. /+ PKI & '% ! " # $
(< PKI ; 6 : 8 9 5
. 6
2 $7 '7 ? B S 2@" - : 2 34 -
3, 1 : *2. -$) R4$ 2 ) 4 S 2@" 'Z .
3, *2. - Z Q‚ 2( % :$ PI ; J 6 ?6
8 Z < '3 2( $4$" S'@Y <$) @" -$4$= - A 8Z 6 ?6
m
>4' 8Z BZ IJ 4 *2. 7. [ O 4 8 Z 4 k>4'
$4 7 $34/ , S 2. hmvvrg p< ' P4 B 5 6 *2.
= *2 34 IA" 4 ) 54 6 ?6 $7 DE 1 ,
r
1 : 2@" 2 34 &?E Q‚ƒ e$4': ' hmvvmg
9:2. . : A8 ?6 $34/ , 4 Q '38 1' €B.' ?6
$7 ^4 ' @" ) X4 4 54 6 2 34 I -' W .
*„2. ) 9: Q Rb % -$33 V 8 , $7 2B3J 8Z
<4 % < . '7 -'( '( 4 f"' </ R ) K'
s
$4$" -$ M = K']' hmvvs G/ j g 2. -$) @/ ) < :$33 >
R4 A F4 !, 2 34 < $B < !, F4 !, / *2. - !, IIA >
*2. 34 $4 7 S < >4
*2. -$) < 4 % @ ) ,- 7 D X4 2 34 54 6
?6 - Y. '7 ' " 2. > A 34 < ) ,- 7 J 7 i ( > 3G
-'E R= X4 R B *$3) " ' „ ||| %A)ƒ X4 <4 % O 4 2@"
t
*$ . Z w X|| X|| 'J . Z i7 &4 2. i …Y
$33 /^A" 8;) ?6 +4 ? B w' ?6 >4 S @/
* : - Y. % C7 @3% = 5 Z :V $ $' $B ?6 >4
?6 D 3 '" S$ C'87 <4 % J'87 4 …Y + •
1
. New Economy
2
. Digital Economy
3
. Turban
4
. Peter Drucker
5
. Qaddus & Achajari
6
. Online
1
0()* +),-. /+ PKI & '% ! " # $
9: Q < 4 % i7 †
$4 7 S . .2 . 6 2. > A @/ 8;)
k
*hmvvt F A X I .g
< 4 % R ) </ : 24 '"' I 4 ! '"
$3G D E . 2 34 < $B < !, F4 !, b I B " < :$3) ,
3 >4 hmvvpg m•I4 , *2. -$% '% 7 < 4 $4 7
:<4 % - :$ A Z2 . 2, e$34':
2 E,' S$ >4 R4 4 ') Y: *2. -$% - / R 'J >4 RA
2 E,' S F= 4 A $ $E B < EE( *2. < 4 % A S$
$3 $4 X) $33 A -$3) , <4 % 4 2.
t s
2. $E B ! hmvvkg : = *hmvvs F A ˆkooo r ‡ " ˆmvvm p>Y"g
*2. A RZ $34 , 4 i7 f 2 E,' $ I
, < ' <$ < ' • <'G 4 :W4 4. T, C 7 2 R
>4 <' IA" </ $ YI ; + S </ @" '
2, 4 8;) ?6 34 -$3) , - Y . '. S$ <' '+G e 'A - ) '
F3 < '> DE <4 " S = <$ <'8 -$) $@B i4 ) 5 O 2 $7 ‰
<'8 D E D ?6 b . . O7 <' '+G U RJ < 3 A6
: >ŠAO S = -$ : '+G U 'A :'I" D E > S = . <' '+G U$
U $ '; S = D . </ -$3 . ,
$ I 27 . 4 * ') - u. = @/ 2. -$) B. R8, >4 2. '. >4
49= 2 A 24' + ( 3 •4 . 4 2. 'G G 'A
< + ^, 2@" f. 3 R - 7 . >A4 ?6 D T,
* . , \', '
1
. Eastlick
2
. Frye & Merrilees
3
. Gefen
4
. Jarvenpaa
5
. Kim
6
. Peter Grabosky
2
0()* +),-. /+ PKI & '% ! " # $
, , - =
, , - 9 C .]C 1
*2. - 4 H D . ps $ - „ ƒ -` S'@Y
: 54 6 'J F3 R@ „ ƒ RJ
m k
hmvvq 4$= 4 g* : EFT EDI <'G 4 3,
p
-'" DE RE . K$ kolv R4
R ) $) RE 3 +4 . < . X4 '8 -'" </ 6 (EFT)
.‹ 0 ! 2 ) < . $( $ *2, :
r
>4 3. <$) 49=< (EDI) - . K$ '
? B b +4 ? B 'J < .
'J 54 6 >4 3. IA" * $=1 :!
t s
$4$" < >4 * S <' $4 7 1 Y. ' , $)
+4 K ' $7 2 B, ) ,- 7 7 .‹
<' . . B. P6 $4$" * B.' f
*$ R % S @. ? B , $7 R iI
$4 7 $ B . P 6 2 34 < koos D .
*$ $) 3)/ 2 $7 : 4 1 '/ , : i7 1 ,
3 2 B, M;4 2. -$) Œ ; . PI ; ^ 3 k k D $"
e$ < % J?7 '6
, , - 9 C .] C 1 ! !: +
[ 1 ^ 4 *5Z :
U G T
l
4$= 4 (ATM) = '7 > ) K$ kotl D .
< ' < $3A% AI > EE( < . D E . 2 34 '@_ koto D .
mvvr F A
< ' 0 ! 2 ) $( (EFT) -'" DE RE . K$ kolv
1
. Electronic Data Interchange
2
. Electronic Funds Transfer
3
. Electronic Funds Fransfer (EFT)
4
. Electronic Data Interchange (EDI)
5
. Invoices
6
. Purchase orders
7
. Automate Teller Machine
3
0()* +),-. /+ PKI & '% ! " # $
[ 1 ^ 4 *5Z :
U G T
mvvr F A 7 1 : (EDI) - . K$
$7 2 B, ) ,- 7
k
? B <' . .1 : (IOS) .< .
S @.
m
4$= 4 '‡ - Y. z• i.' WWW : <$) )' koov
NeXT
$4 , A% P_' D $, 2 RAB ' . X4 T 4 '@A" •4 mt
kpqv NO. 1 , $4 7 > A < >4 A koop
A) * / IA I ) 4
e$) > B $ - I @G RAB ' . >4 5 6
RZ X4 AB 7 . $4 koor j R Z hk
* : > B $) -$( 4 NO. - Y .
D $, 2 X4 koor ‡. R Z hm
2A Z $4 7 w' ?6 D Z J'87 < :$33 $ '
* ') - = '% NO. IA '6 $3 '8(
') - = R . X4 koos '" R Z hp
*$) ?6 X - Y. D'= D 2 I Z
SA R . X4 kool 4' ` R Z hr
* ') - = '% NO. > A 2IZ
4$= 4 Netscape i.' Mozilla : % koor
Pizza Hut i.' & (YJ ! = 1 Y. 4 <
i7 X > F4 %:
i7 'J I ~ ) R: 4 4 1?
7 Netscape i.' F3 < > SSL +! ,B
koor
4$= 4 & 1 , V$ iE, pj ! P" i.' Amazon.com $- koos
2 34 54 6
Dell 2 ) i.' F3 2 34 - Y. K )
Cisco
r
4$ = i.' e-Bay < '3 34 " > $-
s
4$= 4 S 1 : F4 $ = mvvv
1
. Interorganizational System
2
. World Wide Web browser
3
. Jeff Bezos
4
. Pierre Omidyar
5
. Dot-com
4
0()* +),-. /+ PKI & '% ! " # $
, , - 1/
2B 6 *2. - ' ^, 3 4! - $ $ A % u4
3, $3 , S 4 2J , 2. '( 3, I
^3 f $) 2 . F4 !, ^ 3 R : f. 2J , >4 -?
: B.' ^, 3 >4 * ') B " , < . 4 -'E
^, 3 </ : V 6 X4 *$ 4 F4 !, 3B '6
'6 ^, 3 4 ! hmvvrg F A < ' * D 4 4!
$ - 'A < '3 . B " < :$33 V 8 4 < 4 % - +3 < . : $"
*2. -$ /m k D $"
D * 1_ >L ? , .= , , - [5 1/ X !: +
, , - [5 1/ [ 1_ >L
pts mr . F4 !, ] - ' @ 34! F B.' < .
F4 !, f $4$" D$ . ' hD 4 $B 2 .g - +3
4 w 34! F . . 2 . < :$3) , • 8;
!
' 5 27 = S$ - +3 ?6 % w '@ $
. . F4 !, 4 F4 !, ' @ < 4 % $7 F4 !,
F $34/ , < - . J?7 $4$" ) > ,4 ?6
9b F 49=V OB F4 !, RE RA 34!
X
% $7 . . 2Z A " A 'T < 4<4 %
?6 . . ^Z' R4'( < $7 . . < :$33 V 8
27 = S$ ^ '" 4 " 2 % %
1 ,
"
% . . E, $ :$ $ . >, 6 F4 !, B "
) 8Z 4'" , J 27'. V 8 F F 'A $7
R Z 0 ! @) > +3. X, ) Y3 Q <$) L37 </
" 7 , 8 < $ @) 2Z V ? X , ) F3
1
. Procurement
2
. Ubiquity
3
. Telecommunity
0()* +),-. /+ PKI & '% ! " # $
, , 4
f . F3 6 ?6 % R @ 6 3, ] D
$7 2. </ 2 V $ . . *$ -$) 2 $7 -'( '(
R OB b R OB S 4 S A . mr S PI ; •4 . . .
R ) > 4 = ['O. $ 4 2 $7 *$) 49=< 4 , H" OE
< < ,6 ? B R ) ['O. 24 . 54 6 . K?6
B " 2$ 2 >. ( *$) ?6 3, - Y. 2
D , 4 B.' '% - *2. . K?6 ^4 ?6 .V Y)
NO. $7 >4 @ 54 6 >4 $ + 2J , X4 < '3 2 B.'
- Y. $34 A , '7 < $ @) E I. R 5O $ z % 4 I
4 F4 !, < $ @) $7 4 '@ -? 6 ?6 3,
*$34 A XA 4 D H ) 2 , Y) $ -@
D 4 (> 1 * , , 4
2 *2. 2 IŠ ?6 B " 'E >4 @ 4
) 'J '7 $7 $3 ' 2 2. O4 ) < , S 3B X4
'. $" '6 7 D. >4 *$33 • < $ @) Y S4 SA
c O4 ) > 3G 5E( - '7 $3A)' < A 2. ,: Z 2
>4' 3, XA A" 8Z . . $34/ , $ -$ / $J $-
< $ @) $7 • $/ -' ) 54 6 >4 - [?J ?6 6
H S 2@" b 2 1 : : 2E E *$ ‡
.2. %; Q 4 '@ 4 ! A $34/ ,
< @" '% B 6? IA 'J 2. D . „ 2 ƒ
RZ 4'" , J f"' 2Y+3 4 . 2%: -? 2. <? " D
>4' 3, 4 2J , >4 @ 4 *2. -$) PI ; 2,_ ^ 3 "'
$ .$3@ 3, >4 - Y. < $3 Z F= ?6 6
.2. </ > 7 . '+;. = $/ j . RZ 2 AB
A H "' '3 . '7 4 . '7 ^ '" 2
?6 ^ '" ^A" @/ > .' = $ , 49‡ -$% 2. - @" .3
0()* +),-. /+ PKI & '% ! " # $
, , 4 1 5 ! ! 8,
, , 4 1/
e 2 2 4! 7
*$3 - Y . 2 34 RJ 4 $' 2 ?6 2 B, 1
* $3 24 4$ $ / >4 $ ' 2 ^ 3 'A 8Z 'A F; 2 A "'
~ A: A" > ‚ $3 R Z 4 F; $7 i7 • 4= V 1
*$ F $3 S I B 2 4 2 ) 34! J 4
* $ '7 F , 'A $7 . 2 , Y) F4 !, 4 5
3 F4 !, '% 2 Z $) 2 +4 1 $ ' 2 , Y)
*$3 , " 7 9: 4 .
' $' 2 2 34 1 : > 8 9)
*$4 A ^4 ' SME IA" J'87 F; > </ $34 A R @
, , - ( < 4 (> 5
1
. CommerceNet
2
. Corbitt
0()* +),-. /+ PKI & '% ! " # $
-$( 4 IJ ^ - 2. - S mvvk D . 2{ +4 F W=
e $-' B.'
PB] 3 A6 X 4 A w' R4 3 R4 R ) Y. F
+3 , R4 f D$ < $E, ' , 'IB
2 34 > 4 = 2 . ? $ . hPKIg k 'A $ I 27 . 4 R4 <
*hmvvr F A < ' RE g ' Z R4 ? %
-$) 7 3) @ K']' X4 < '3 BO < A
$ I !" X4 < '3 A *hmvvl F A > 3= RE kooq mS @+3 . 3 g 2.
r p
F A kooo F A g 2. -$) 7 3) 4
< : ' mvvv kool F A ‡ " kooo F A >A, koov sR = koot
$3A $Z ! X4 < '3 A hkoosg o hkoor q$IM4 kooo l0 koor t2
kv
*hmvvs F A RE g $3 P4 B O 4 Y 8(3
4 54 6 ?A 4 kk j 4 ' A 2 34 2 3 w' ']' -
km
!, S ' % $) i7 •4 . > 7 $ '38 ]E
ks kr kp
?6 > , : +A 2. 24' 2Z . &; !, S .'. "
'"' - *$ ') - + b 2@" - :/ < 8;)
24' 2Z . 2@" '7 , 4 4 / 34 < 2. </
i7 $ &3" 24 . B" F 54 6 34 ?
pv mvvt D . $3 1 !: • *$ - 'A R4$B '7 i7 $4 7 < $(
:'I" '7 i7 $ $J mr i7 $4 7 4 4 / 34 < $J
4 4 / 34 <' I pm*l 2. -$ / 1 !: > A *$ - 'A $( 24' 2Z .
1
. Public Key Infrastructure (PKI)
2
. Ratnasingham
3
. Ba
4
. Beatty
5
. Czepiel
6
. Morgan & Hunt
7
. Noteberg
8
. Reichheld
9
. Berry
10
. Relationship Marketing
11
. Viruses
12
. Denial-of-service attacks
13
. Spyware
14
. Malware
15
. Phishing
0()* +),-. /+ PKI & '% ! " # $
1
. Harris Interactive
2
. Bankrate
3
. Anonymity
4
* Bhattacherjee
5
0()* +),-. /+ PKI & '% ! " # $
1
. Luhmann
2
. Hirshleifer and Riley
3
. Brielmaier and Diller
1
0()* +),-. /+ PKI & '% ! " # $
1
. Firewalls
2
. Pavlou
3
. Winand & Pohl
2
0()* +),-. /+ PKI & '% ! " # $
, , - + >?@ 1 1
i. 54 6 $4 7 w : A8 $) n 'O A
F 2@" ? B '"' ! : S '‡
RZ b 4 $ '" i ( >4 3. 2 BOZ S$ NO. <
>4 @ IA" * - A $B X 4 2 34 F3 9 *$)
?6 2 3 i X 4 <' 34 $4 7 $34 , '"' 2 BOZ S$
X4 ! <$% -$ % & -$) 4 2 $7 D'8( 2 Y 8;) 4
* 'A - ) 2 $7‰
PI ; . F3 S '"' X 4 K'
-$) 4 O >4 YI ; $3 E 6 2. ,: Z B O ' <': ': 3
hmvvkg X < ' $3 E 6 hmvvvg k$4 •+ - : $3 E 6 <' IA" 2.
3 h1*| kpqsg $ * - ) `> 3 $ $3 E 6 hmvvpg p
.> > A+
'"' ^ ' 6; X 4 F)'= -'( hmvvpg . > > A+ $3 E 6 < Z
' 9 5E( $3 E 6 : @G -' X Y -'
*2. - 'A $3 . - < % p k D $" 'J
1
. Angus Reid
2
. Turban & Lee
3
. Dongmin & Benbasat
4
. Head & Hassanein
3
0()*+),-. /+ PKI & '% ! " # $
, , - L R L 1 - HC >?@ 1 " ! : +
L N >; > E%
. Q >L R
UXaa"T - = = (& = UXaa"T @R > = UXaa!T D= =.6 H UXaaaT 1 0 & L =
* '% S > 'J ?6 D E • 3 + • /^A" V $ 2. > A -$3) , • ?6 2 3 ' + • 8;) ?6 hkg
*$4 A ] b ?6 2. '7 - +) , • 8;) ?6 4 3 + • * . < @3= ?6
2 , ( f. 3 'J 8;) ?6 • ?6 f. 3 2_ Y S$ • J'87 4 i + •
* '% 8;) ?6 f. 3 2_ Y S$ •
*$) > 54 6 $4 7 • J'87 4 2. > A -$3) , •
$3 "' 3 R4
+ </ , ?6 D E 6 •
*$34 A .
*$) > 4 = D'8( 2 Y • D'8( 'A < S$ • D'8( > 4 = 2 Y • -$ % D'8( •A < '" S$ • h mg
*$) EO3 D'8( 2A Z • RE RA 34! • D'8( 2A Z • X4 ! </ D'8( 2A Z 2 Y
RE RA 34! •
~ A: 34! •
^Z' R4'( '7 $@B - +) , • R4'( < • '+;. = Z 24 .& 2I Z • $4 7 $34 , R A ' + • h pg
*$3 RA D'8( *2 % 2. '7 - +) , R B S$ • % $7
F3 S D $ $. % • 24 .& u. = ?6 2, 4 •
*$) )$ * ') S $3
4> A b 2%: 4 F3 'H • "' 2 ) 24 .& < •
*$) R % : 6 X3 34 4 ')
, -$3) , j A < • * '" ^OZ
*$) > A ^Z ' 7 24 .& . . •
* '% , $@+ AB $7 • *2
<4 % 4 )R @"' - +) , • *$) % $ 24 .& •
*$3 *2 V Y) ' ( 7. •
i.' -$) 4 4 A3 @3% = • *24 . F4 A = 6 <$) : •
*$) N (J f D'8( 7 R4'( •
* : D A 1 Y. $ 4 ‘ ( 27 = • 1 Y. 2%: 'H $34 , < ' R % •
-$3) , j A < < 'R % •
1 , •= $7 2, 4 < ' R % •
4
0()*+),-. /+ PKI & '% ! " # $
$@+ AB
'. f -$3) , $ ! A •
% $3 ^, "
4 ) 2. '7 - +) , "' S$ •
<4 %
'" 2. > A f • i7 -$3) , 2 < 3 A6 S$ • F)'= 2@" , F ^ 3 -$3) , • -$3) , 4 3)/ S$ h rg
$) )$ " 7 e$) ) $ 4 ' f < 3 A6 2 I Z
</ R B D f 4/ • '8( 2 Y
U2. ' 24 . < A >4= 2A Z 4
^Z' R4'(
'Hg 1 , •= $7 %= •
h $@+ AB 2%: 2. '7
1 , F3 23 > •
8;) ?6 2_ Y •
, ?6 - % 4 •
)$ BZ " 72 - +) , •
*$)
3. D 54 6 $4 7 R4 A • 3. 4 N" • 4.
S$ •
0()* +),-. /+ PKI & '% ! " 66# $
D - 9 C' BA = ( < 2
L (< L (<
-$33 A V 6 '" < 3MA ! i7 < @" O X4 A 4
i7< 2 BZ' *$ ') \?6 J7 24 '"' $3 -$ ') A
i7 T, *$3) ) -$ ') A 4 -$33 A FE $3 ' Y 24 '"'
V 6 $3 $4 24 .& X4 2. % -$33 A V 6
*$) 24 .& f J 4 -$3) , N4 J '6 4 24 .& -$ ') A
1S%2
r
) $' 34 -$3) , 4 :$ M = R
c4 A '"' X 4 ' fIb i7 < 4 % *$3 , 3 F= R Z b
iE, % ƒ @_ hmvvmg >Y" '+ A *$3 >ŠAO 49=<
?6 '7 '6 2. > A $ S </ $4 7 34 < $ $3 4 24 .&
1
. Egger
2
. e-trust
3
. Garbarino & Lee
4
. Anonymity
0()* +),-. /+ PKI & '% ! " 66# $
(< >;
S hkg e$3 4 % '. C 7 F3 K' i7 -$3) , % A
, J hmg F3 '7 8;) ?6 4 A -$3) , i7 $4 7
1 ,R ) L $ = F3 >4 X4 *m</ <$ 7 G -$3) , 24 .& $4
4 F3 > 3G <$) : % * = -$3) , -'E 1 , 4 BZ
* / $ '7 2. $ 2. M/ % $) >ŠAO 2 4
4 *V b C , H .= ( < & @=
2. BZ' R ' , :W4 ! i7 A i7< A $3 A
i7 F3 X4 <$) : , S A NO. *2. 3n ']' n
} g$ `''3 . Y - :$4 , > 3MA *2. Y PI ; ,
*hmvvs >4 '
- <G H : F 5- 1 > E1 3
1
. Friedman
2
. Window-shopping
0()* +),-. /+ PKI & '% ! " 66# $
>., 4 (* . # *= X ! 8 ,
') :'I" ) @/ -$ % $4 2. ?6 S 2 ,( 9 A K1 R •
4 , H" 2 BZ' $4 A -$ % X4 4. & DL * / RA
4 < '3 2. ' ) -$3 •4 . X4 !@ S DNS IP j /
*$ ') 2 , ( $4 J'87
- G (R 3
. 2@" S: 'A %; ) 4 4 X4 BZ X4 Z :
R % 83 >4$3G IA X4 *2. IA X4 %; BZ > 3G *2. b c4
>4 6 *$) $ '7 - 'A = k-$33 IA i.' 2. S: 'A IA *2. -$)
P% 2@" ! ! 3MA 2, : $ '7 S V$ 2@" 4 F3 S:
m
'A < / 2.$ IA V $ )< . = . 4X $4 * 49=f ./
e 'A P4 B 4 'J IA < ' $E > 3G *2. p b c4
2. 'AB BZ IA < Y~ IJ $ I b Y 2. P4 B
4 2. . >4 4 $3 . 4 $ Y >4 *$3 y
> A S FTP $3 •4 . 7 D L < '3 *$3 > B ^4 Z < ' b
2 B, 7 *$3) D B, b +4 7 D B, . 7 2.
7 X4 . . 1? $3 $ A) J; 2 B, I 2
'J b $E >4 *$) $3 '7 &' ( )23 2 $3 i4 )
*$ ') P4 B 4
*2. -$) , 49= )X 4 2. = . i.' e •
1
Attacker
2
Vulnerability
3
Unauthorized
0()* +),-. /+ PKI & '% ! " 66# $
1S%2 3
4 ) 49=f ./ $ ' $4 1 ' c4 " @ X4 . ' 3
b F3 S < 2. . PB] X4 49=f ./ *$4 A - Y . 4
* / ,
k
Y R 2. •O7 !, S X4 49=f ./ 2. - <% R.
4 'J 49=f ./ < ' Y4 B > 3G 3. *$ y - Y . 4 $ ' $3
e 'A $3 .
4 !, 2;. .• ;% 4 6 2. 49=f ./ z 6 49=f ./ •
$ '7 '" . 49=f ./ 5 Z .- = b I * ') RJ !, S
*2)
A . .- = O7 2. 49=f ./ z .- = 49=f ./ •
* ') RJ ) EZ 6
. X4 $3 = O7 2. 49=f ./ z $3 = 49=f ./ •
$) ) ’ ,F = ' AI • . . A . $3 * ') RJ
* 'A D B, @/ 49=f ./ •4 . < ' 4
de1 3
$ ' 4 c4 4 IA X4 2 E,' 'J * BZ X4 b c4 2.
e 'A $ '7
* ) 4 4 X4 . . - ' b F4 !, 2 zm . . F4 !,
*$3 </ . . , ! ?6 % 2 zp ?6 %,
* ) 4 ' ‡ X4 - b< H 2 zr ?6 V (
* ) 4 4 ^3 $A < 'A $ 4 D?(A] 2 zs2 $7 2B A
*2. " R Z -$)^4 ' ) < ! 3 'J . •4 .
1
Krusl
2
Increased access
3
Disclosure of information
4
Corruption of information
5
Denial of service
5
0()* +),-. /+ PKI & '% ! " 66# $
(@ > D ( L 1 - G (R =. 5 3
2. - 'A E @/ IA -'( "' 4 ?A >A 3 <'A .
*2. -$) N4 %
):7 !89! 5 3
1
Theft of resources
2
Master Boot Record (MBR)
1
0()* +),-. /+ PKI & '% ! " 66# $
):;8< 5 3
V ?7 *$33 4 ) 2( '7 , ; $3 4 S
K' * : %3 ) RE 'O $ ' ') R8 I4 , S 2 S j 4
*$ -$) . 2A Z >4 '@% S
$3 4 % 2 = i.' S . >4 zk-' = S •
D =/ D =/
N f >WC 7! f >
=L = 7X
_ 7"
' 7`
f > D =/
1
Mass-mailing worms
2
Network-aware worms
2
0()* +),-. /+ PKI & '% ! " 66# $
): ! 8= 5 3
>$)? 0@9/8* 5 5 3
, X4 <$) = *2. ) 4 4 IA - 4 , !4 . R %
X4 - Y . ' ?6 $3 ' -$) !4 . , !, ?6
%= !4 . ?A > 3G '@% K' *$34 A R ; N (J " 7 . V (3
* . R; " 2. Heap ,
ABC 8DEF-B G ,? 1 5 3
$3 ) 3 ?A & 2( ?A z& 2( ?A •
/HB. @ / G ,? 2 5 3
).G K 0/!LI,J G ,? 3 5 3
)M'LN : ! O),J)M 4 5 3
1
Sniffing
2
Mapping
3
Secuirity scanning
4
0()* +),-. /+ PKI & '% ! " 66# $
*$33 IA 4
Z 4 /2. '3 $3 3 zr} 3 A < A" @ •
*$33 IA
4 8;) /2. ' 3 $3 A" @ zs , < 4 3" •
*$33 IA
*$33 IA 4 7 '3 $3 A" @ zt< 7 •
4 j ?6 . < '3 $3 A" @ zl D'T , •
*$33 IA
BZ *$) G 4! , G 6 A 4= 23 A
X4 24' $ ' 4 - .“ • ;% S! A 4 4! , 6
, . @ T + - @G $3 24 ' 4 . 3) •? 4 6 24 '"' 4 ,
24' / 6 *$ 3 4 . 3) 0 . 4 A. 3.
*2 - . $ I6 -$ M = S! A 4 2 )/ 24 '"'
1
Hackers
2
Spies
3
Terrorists
4
Corporate raiders
5
Professional criminals
6
Vandals
7
Voyeurs
0()* +),-. /+ PKI & '% ! " 66# $
, 4 T •4 . 2. 3 27 . 4 (PKI) 'A $ I 27 . 4
24 4 $ $) 4 4 2. . !, S !, 2;. R ) 'G @G $3
2@" > T, X4 > 3MA *2. S 4 ': $ I ^4 ' .- 7n 4
4 ': 4 T +! - Y. ) 6
$3 - Y. ': $J ! -$) J aD 4 ': 27 . 4 >4 *$4 A ,
*$4 A 54$8 !A F3 X4 : V 6
R6 ! A D 3 ^4 ' $ ' 27 . 'G G 'A $ I 27 . 4 >4 3
e $3 'A $ I 27 . 4 !" *$3 , ': <
<!; X4 (CA) ': $J ! $3G 4 X4 A . !" •
ˆk ':
1
. Certificate Repository
0()* +),-. /+ PKI & '% ! " 66# $
*$ -$@ . $@+
$J ! 'A $ I +! '+ 4 ': 'A $ I 27 . 4
Sb .- : ) 3 AB X4 f Z I I ) ':
e : 4 ' . D'AB PKI X4 *$3
. < ': $J •
4@ S 2 Q !, S •
': ' 4 +G ‡ 4 •
': D O $4$ 24 4$ 4 ! •
w' %= $7 •
<' $ • T +! 2IZ 'A $ I 27 . 4
- 2 A … Y 24' 4 . 3) R ) 3 •4 . • 2I Z >4
* - Y. 49= + (
'@. b HR E . - 2_ Y 3B 2 B " … Y 4 k2 A
' ?6 - 'A $4 3 2 B " …Y *2. $A 4
< i.' 4 - 2Z $ ' A 3 G : *2) + 2. .<
i.' H A $3 > AT $ ' $3 4 $ ') - Z .
7 : *$ ') DA . N (J R ) $ ') 2. '7 <
:'I" ' 3 *$33 )$7 @/ 2 B " $3 H . -
.. X4 - 2 B " < 3 A6 54 6 >4 4 "& 4 . O7
$ H '( - $' x 2. S ' 3 >4 * ') &' (
? H >4 $ 4 H b , i.' ?6 I : 3B4 * '% • ;%
'A $ I 27 . 4 *$3 B ,4 ?6 ') "' -$33 2, 4 $) '@%
-$33 2, 4 : *$ 4 ?6 T 54 6 - 2 A …Y 2 I Z
</ $3 $ 4 -$) 2, 4 ?6 '"' T $ ' -$) T ?6
*2. - H $ -$) T ?6 </ '( $ 4 $' 2. 'J
1
. Integrity
0()* +),-. /+ PKI & '% ! " 66# $
1
. Authentication
2
. Confidentiality
0()* +),-. /+ PKI & '% ! " 66# $
9A (< > I
$I < E +! V ?7 *2. < E +! 3 'A $ I 3,
$I < E +! ') - Y. ?6 4 %:! +! @%
]4 3" -$) $ ' < X4 $ I >4 *$ ') ,: >4 Y
+4 $ I ') - Y . +! $I X4 : '( $3 i
- Y. $I Œ >4 $ ' 4 4 '+ * ') ,: 4 %:! 2 4
-$ 'A $ I $I 4 'J $33 > AT K']' >4 $ ')
$ I * 'A P% : . <' A J'87 $ I 3B4 +4 $ I : %3 ')
(CA) ': -$33 J ! <!; 54 6 - : '6 -$ 3: ': 'A
J'87 $ I * ') $@+ ': f J ! J'87 $ I * ') %3
@ ': f J E D 3 Œ 7 !: $ ') - Y. T 4 . 3)
2 L Q^" ! <' $ +! J'87 $ I *$ ') A
* 'A 4 -$) +! ?6 < ' S ! 'J 9:
* ') - Y. 4 . 3) T +! 'A $ I 3,
-$33 2, 4 'A $ I -$3 . , ') - Y. +! 'A $ I 3,
1 '7 J'87 $ I 4 %:! 2 4 -$33 2, 4 $3 - Y. +!
*$3 - Y .
0()* +),-. /+ PKI & '% ! " 66# $
UCAT ! , , > /
': 2. A ' 24 '"' ': $J ! X4
! X4 '7 ': ': $J ! *$3 %3 J
2. ! ': $J ! NO. >4 * : ': $J
m
%4 4 %4 ': $J ! $3 T 1 '7 ': '7
DO % $J Y _ ': $J ! *2. -$) -$ A '
': 2. . 3. 5 O 2 4 P4 _ > 4 $ -$@ ':
*$3 S '7 w' (CPS) ': 4 " RAB ' . (CP)
"
> 2R
X4 hSubjectg ': -$ < '3 F 2. 4 '"' ': f J
': </ f J i.' ': X4 1 49= S +3 * ') n ':
'"' 'A $ I i J'87 $ I $3 54$8 2E E
+4 *$3 - Y . $) 6' CP ! 5 O3 ':
'"' 'A $ I i J'87 $ I 49= ^Z ': 1 49=
. 4 C ;) $3 ' ': < J *$) 7 2( , J ':
*$3) 7. 4 !" 4 D 4, .&
1
. Certification Authority
2
. Root Certification Authority
3
. Subscriber
5
0()* +),-. /+ PKI & '% ! " 66# $
!
L (<f H
e$3 - Y. 4 ' ': 2. 4 '"'
*2. -$) T 4 'J ?6 -$33 4 24 '"' 24' • ;% •
*2.
< ' w' a 2(J A 54 6 ': X4 f J ( w 4 •
1
. Relying party
2
. Certificate Policy
1
0()* +),-. /+ PKI & '% ! " 66# $
UCPST ! , , > 1 + 8 (*
': $J ! X4 $3 4 " 4 ': 4 " RAB ' .
$ $ ' 4 $4$ D O 24 4$ $J 2 B, : (CA)
, , >
! 'A $ I ': 4 X.509 ': D 4 ': +4 S ':
* . i 'A $ I X4 24 '"' X4 24' 2. - R4 , X4 ') -$
b/ u4 hsubscriberg ': f J 24 '"' S $3 ': IJ !"
': . 3) X4 hCAg ': -$33 J! S 'A $ I ': - <4=
i z2. ': $J . S! -$33 N4 % z hCPg ': 2. . $3.
T 'J </ -$33 J ! i.' ': X4 '"' ?6 * .
* ') ,: ': %; < '3 T >4 •= </ ')
1
. Certification Practices Statement
2
. Certificate Revocation List
2
0()* +),-. /+ PKI & '% ! " 66# $
!
N 4h 5
24' w' ?6 2(J . /^A" 2. 4 '"' S 2 Q ,
S 2 Q , * ') 4 $) $ '7 Œ ': ': < J
2. '7 DE 2Q 2 ': $J ! X4 ' f ':
i '] 5 O @/ w' ' 4. ': D O $J C'87 < ]E
T </ A $@B z ': $J ! '. -$) • ;% RAB ' .
*$4 A S $Z z2. - 'A
m
• ;) 2. ! ƒ e$3 P4 B '+34 >' 3, $ . I .'
$ ') - Y. 24' $ 4 ' ! 4 $ I X4 'A </ I . -$
*„$4 A D 3 ) 7
$3 ' > ' >4 $ ') - 7n >' ': i J'87 $I
'AB J'87 $I !, S >' *$3) ) !, 2;. 4 !, S 3
$3 !, 2;. > ' *$ ') - 7n !, S < '‡ D3
$ -$) +! ?6 2_ Y .- 7n $ ' $3A)'
*$3 S +! IA $3 ' ! @/ '7
1
. Registration Authority
2
. National Institute of Standards and Technology (NIST)
3
N 8 \\9 5
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
D O , , > N 895
. 6
P4@ Q , , >
- ' S A 2 . u4 K ) 2 . u4 R ) ': - •
* - J
': -$33 -$33 JR ) ?6 •
5
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
hp m R )g *$ 4 A X I Certificates $ I
5
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
5
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
, , > <
1
. Relying party
5
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
(purpose) , , > L i g X 8,
, , > 2R N •
55
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
, , > 2R N j X 8,
, , > < k1 •
51
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
, , > < k1 l X 8,
U , , > L T , , > L •
52
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
.' 1 , , > /
N< , , > /
, , > < k1 # X 8,
53
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
http://mocca.ir
, , > < k1 $ X 8,
* , , > > 8, 5
h ': - f8 S$ g j 3) ': •
54
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
5
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
U < k1 N( TL F6 > •
1
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
L : 3= > •
L : 3= > !` X 8 ,
1
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
, , > > O 1
+! b . . :'I" 2@" $3 +! -
hD E > ?6
49= •
6 < > •
*$3 2.
': 4 < $ 4 $3 4 ': $ ' client $3 ': 2. '7 . Z
A R Z B client i.' -$) 4 ': 'J *$3 S $Z . D 8 2@"
1? . D8 2 ': 4 < $ client *$ D8 - " . $)
- " ?J 4 $ $ >4= 3 NO. . . - " client . 2. > A $3
1
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
e : S 4 'J 2. '7 R *$ $ . D8
*$ . ,
2, 4 . ': Client •
': $J ! 2 </ $3
! i.' . ': : *$3 XG B
Client $) -$) T B ': $J
$3 • ;% Client 24' Client ': . * 49= ':
* $3 2. '7
34 4 $3 D. ': 4 Client •
. ': D . < $ $3 1?
* ') R8
$3 XG A ' ': 2
>4 $) A ' Client ': :
': Client : * ') Z > 2 %
* $ '7 Z >4= 3 NO. > w . $3 D .
1
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
2 Q 54 6 >4 $3 T 4
BZ </ 2.' = S = ')
*2. -$) D . ' -$3 . , '.
S = $4 A > AT $3 T 4 'J ': f J R A4 •
*$) 2. -$)
: > +3 ?6 +! 54 6 > w X4 4 •
15
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
L > 0 1 41 > 1o •
11
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
L / - H •
12
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
U$) ) <
< )'= I i.' D $ 2, 4 w' 4 8 / $4 -$) 4. A) $ 3 ’ ,
A) 2. < ' svv iE, 4 8 >4 'A 2A Z 2. f " *$. 1 , < 4
A) Z '834 *$ 3 $4 7 'A </ & ) 'T 54 6 $ '
24 . < & ?6 2, 4 24 . </ $ $ $4 $4 $4 7 $8Z
A) - RJ ' X X $ 24 . & A) $4 2 1 '7
$4') >ŠAO $4 Q *$ 3 < 24 . & '7 & w' ?6
X 24 . & ) iE, 24 . </ 2. > A 3B4 *$4 -$) RJ < 24 . & BZ
A) & ( ?6 $ '7 2. ?Z 24 . X4 ^Z 2. A)
S $4 ‡ 67 < '7 X IJ 24 . j / ') @3% = *$3 2Z .
>ŠAO $ 3 & (YJ ( ?6 / F = •= *$4'% ,:< )
*$4 'T IJ 24 . & $4')
V = (1 m ?1 J 9 6 41 ( q = 1 p(3 0 q •
4 L
A) > -$) D ?6 $ ' A +4 • ;) x 2. 3B >4 >A4 w
RJ < 3 A6 $4 $4 -$) RJ IJ 24 . $4$) >ŠAO Z *$3 -$ % 24 . </
>4 -$) D ?6 2. Z >A4 '8 $8E . A) 4 > w $3
*$ ') D$ -$) ! 'J
R Z < +4 i.' A) D D ?6 $ R8 2 34 A) Z G
*$ ') D -$) ! 'J ?6 >4 34 + ' $ '7 24
*$3) SSL $3 @/ ( ?6 2 4 (YJ 'AB
>A4 : R ) 2 34 : 2 B] H $4') (YJ > 3G
$ 3 2Z 2 34 : •? $ ' ' 3 >4 *$) $ '7 - :/ w >4 < '
A•? > 3G $8E 24 . <$) RJ •= 'J $4') >ŠAO w < ' >A4
•? >4 *$ 3 '7 ( ?6 4 ! < $4$4$ '7 :
H https http j / 2A Z >A4 w 4 S +3 *$ -$) • ;% 4 R )
2. > A * ') _ : status bar 2A Z RYZ 2 ? $ 4
*$) Y RYZ >4 F4 A R( PI ; :
13
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
Http
s
14
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
Http
s
1
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
2
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
2
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
* : • ;% -$ :•4 .
+! 4 '+ K' . -$ : -$3 •4 . K ) $ <A •
*$33 5, '
* : -$3 •4 . ! -$ :•4 . 24' S ! 'J •
*$34 A 4 Y; )
*$ ') + ! SSL 3 6 •
] U )B=/ 0/ 8^8DEW<" ? 8 1 1
*$3 4 %:!
*$ : 9:! < E $ I XA . '7 html .& •
*$
2
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
2
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
IPSec Certificate
J'87 > 6 < 3 A6 'G G Internet Protocol security (IPSec)
34 ?A R E , i7 X4 $) +! S! - Y. )
*$3 , J'87 )
25
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
e . . V$ IPSec
IP 2 = '( 2 ,( •
, , > - R .A Q 41 1 2
, , > - R .A Q Xa X 8 ,
21
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
]E S 2Q •
* ' ~ $ • 6' S ,RA o
2. '7 $ 4 •
] E 24' 4 . 3) $ 4 o
': $ I $4$ 4 $J •
h 'J g ': D O •
22
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
23
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
.- = - >ŠAO ( 24 4$ 4 $ . .' X
I7 'J F3 A -$) $3 4 EZ $ . > 3MA *$ - 'A
$' - ' >4 $7 * '" " 7 'J ' !I 5 Z 2E O
3. $J +4 $7 24 .& ) 2_ Y 2 : 4
EAR'!8-A ,RDZ(H? 1 3
c* H=! d R e =Z(H? 2 3
) 54 6 BO E E( c4 D $) E E( .'
*2. @/ I. < < ?6 >A4 . . $3)
> 7 E E( c4 : • ;% ^OZ '6 2. S > 3MA
+ ( - ' >4 <' ': *2. -$) % 3 G i.'
*2 " - @ @/ >A4 D E 'O3 A ?6
1
. Definitive authenticity
2
. Legal digital signature
3
. Verifiable electronic transmission of messages
24
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
EAR'!8-A \ G * ! \ C MDZ(H? 3 3
EAR'!8-A \ !+ Z(H? 4 3
$3 *** @) 4 • I= -: R Z 2 4 4$ ['O. A
B.' * : …Y j ?6 + ( @/ $3 4 4 'Z !I
* ': - Y . $3 >A4 2
O)' ^H ? Z(H? 3
( >A4 24 4$ 2@" 4 R - $3 'Z $7 - ' < +4
T - Y . *$3) ( 'J ?6 >4 D ! ?6 4 R Z
] - ' >4 < ./ - Y . < > 3MA 'Z + ! 2 I Z f. 3
- Y. 'J I . 3@ - ' >4 I7 $34 , @3 4 $.
+4 > 3MA % T .$3 <'G ' 34! 4 3 @/ < 4 %
* :
F: 4
(IPO) Indian Patent Office •
$34 , A :S >4? / 'J ‡ 5 2. '7 7 2 Q 34 RZ
24 4$ S$ 2. '7 4 $B <'G ? % 2. -$) S . 'J
2
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
E-Procurement •
. . : Z - Y. ' >4? / 'J 8Z 3 . 54 6 >4
< 3 A6 8Z 3 $3 + ( J'87 4 > 3MA : % 8Z 3
* ') RJ %
1 A 4( •
3
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
UK Oil Portal 4
$34 , < 'A V$ . UK 2B3J <A = LCU $
1f )Q98 L7 @')X\ )9 4
. . . D 3 2@" % < $3 . j! PKI X4
*2. - ' VPN 4 >4? / !, S 54 6
4 ; c4 2Z XA 2@" . ; PKI ! KSOS -
*2. - -@2 .
- Y . PKI -$4 ! (KDOT) j ! RE RA < A = - ?B
+4 V 6 KDOT R3. = ,6 < A= $34 , .- . f"' 2. - 'A
*2. -$) 9b S , V 9 54 6
F89 5 4
)R 8-* 1 4
(ABN-DSC) Australian Business Number-Digital Signature Certificate •
. . - 2. 4 - +3 A , 8(3 - A) X4 ABN
$4$" . - +3 < . I 4 . 3) 2@" - A) >4 *$
2@" - ' ABN i 2. ': X4 ^Z ABN-DSC * ') -
1
. Licensing and Consents Unit
2
. Department of Trade and Industry DTI)
3
. Kansas Public Employees Retirement System (KPERS)
4
. Kansas Secretary of State’s Office
5
. Kansas Department of Transportation
3
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
&/
ABCDEFGHIJKLMNOPQRSTUVWXYZ
DEFGHIJKLMNOPQRSTUVWXYZABC
This is a test
Wklv lv d whvw
$' “$ - / ! 'J - ]4 - Y. 2. AI +!
?6 D E > 3MA ?6 . - 7n < I >4 *$ : 2
X4 * 49= 'J ]4 4 '+ - Y. + ! RA * . 5E( >
RE 3 -$ : -$) ! S = </ •= * ') ! $ I X4 - Y. S = X4 .
*$4/ 2.$ IJ S = ') $ I X4 - Y . "</ ')
4 '+ X4 + ! $ I X4 XA S => < HF +! +4 <
> Œ ;. Z 2. ^IO 4 '+ $I 8;) @3 'J *2. +!
'( $' $ ?6 </ 4 4 8;) $) -$) ! > IJ
*2. -$) y' 3 +! 4 '+ > ) - + < @3= 54 6 + ! *$3 $ = . . S =
< @3= M / *$3 +! 4 '+ < +A 2. </ ’, + ! $4$" 1
*2. $ I iE, 2.
?6 D E : RE 3 > 'J ?6 < ' + ! XA
3
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
!
D 6 K 1 &
D 6 K 1 & X! X 8 ,
* ') - Y. ?6 4 9:! < E + ! 2E E
1
. Symmetric
2
. Data Encryption Standard
3
. Personal Identity Number
3
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
O/) - )'g-[/Hb
R )g 4 %: ! +4 +! $ I X4 ˆ$3 - Y. $ I 1 >4
R Z X4 -$) +! - ': $ w ]4 $I *hmp m
X4 „ J'87 $ I ƒ X4 e $IŒ X4 , 2E E *$) +4 4 %:!
SA 7 'A $ I $) , '7 5IB “, J J'87 $ I *„ 'A $ I ƒ
* : Z $ , >4 w $8Z J ;)
$3 4 J'87 'A $ I 2Y" X4 < : < E +! +4 <
*$3 . Y - ! < %4 S = $ I </ 54 6 < +4 $3 %3 'A $ I
! S =$' „ J'87 $ I -$ @3 ƒ < '3 2. < : • ;) @3 24 @
*$3 'A $ I </ -$)
1
. Asymmetric
35
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
D 6 K 1 & X" X 8 ,
ˆ2. • ;) </ 'A $ I iE, • ;) -$) ! ?6 D .
R Z b< E X3 :W4 >4 @ *2. S >,6 'A $ I $ 4‚ @3
*$) 24' $ 4‚ T < '
* </ 2 3 2. $ I D . ^4 ' S$ < E 1 24! >4 A@
> 3G $ I Œ $ ' *$ F @"' R Z < ! 2 . </ -$ M = .(
*$3 fI6 -$ M = 4 '+ ! $3) ) O
1
. Hash
2
. Message digest
31
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
D L ,Q N % ) * D , N < X` X 8 ,
N % L ,Q D D @ ,1 Xg X 8 ,
32
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
, , F
K S
33
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
N % ?1 F Xj X 8 ,
*$ 3 -$ % ! T 3. R S =D. T - ? ml m R )
S = hhashg . ^ 54 6 •= $3 D . & -$) T S = X4 $8Z • /
S = - A - ! '7 J'87 $ I i.' 2 4 >4 •‡. *$3 4 2 4 X4
*$3 D.
2 4 X4 ') 4 %:! • / 'A $ I i.' -$) ! ?6 -$ : 2A.
: * ') 4 2 4 X4 ,4 S = . ^ - Y. > 3MA $4/ 2.
- > -$) D . • / V 6 S = $ < % $3) 4 2 4 >4
*2. ,+ Z H 1'; .
34
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
D < N % ?1 F Xl X 8 ,
N % ?1 &/ F X# X 8 ,
3
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
* ') D . -$ : -$) ! S = 2. V B „ 2 =ƒ
-$ G $ ' hhashg . ^ X4 $3. h• /g -$3 . , 24 @ •
* / 2. < E
- + ! </ $3. • / 2. , 8 $ I < A E Z < E $ I >4 •
4
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
*$ <% .3
'" T - Y. R . $) Y: ! F = M/ 3 I '6
e
*2 -$3 . , $) >ŠAO $ ' -$ : ehAuthenticationg 24' $ • •
4
OLP H' ! EQR'!8-Q E: HS %;!+ " 66# $
4
N 8 \\9 5
!"
($ ' "$ % & #
/HY X E H,. RWX \ _)* 89( i =8 ` W* E$8c %;H* " 66# $
. 6
45
/HY X E H,. RWX \ _)* 89( i =8 ` W* E$8c %;H* " 66# $
%4 ! 4 ' $J •
, , - .* /
41
/HY X E H,. RWX \ _)* 89( i =8 ` W* E$8c %;H* " 66# $
.' 1 , , > /
! ': % $J •
! N (J IA < 3 A6 D'8 •
%4 !
': $J ! J'87 $ I >A4 $@+ < 3 A6 •
%4
': 24 4$ $J B S A D'Š %4 ': $J !
>4 % ': $J $34/ , 24' $34/ , S 2 Q $34/ , R )
! >4 IA $7 B S A 5 O > AT > 3MA $ I $4$ @/ 'H ':
42
/HY X E H,. RWX \ _)* 89( i =8 ` W* E$8c %;H* " 66# $
U =T N < , , > / 5
43
/HY X E H,. RWX \ _)* 89( i =8 ` W* E$8c %;H* " 66# $
44
/HY X E H,. RWX \ _)* 89( i =8 ` W* E$8c %;H* " 66# $
7 V 6R r C =. 1> > UW
‰ 2 ) ‰< . 8;% @3 -$) &' ( .' ‰2 )‰< . @ !3 ': >4
* : Œ </ Z'E C ;) I . 3) S R Z .'
4
/HY X E H,. RWX \ _)* 89( i =8 ` W* E$8c %;H* " 66# $
N< , , > / - A - v 9) 5*
U =T
': *2. -$) E I . . ': V 8 ! >4
b F; 2 w 2 < 6 2. 24 '"' C'8;
w J'87 F; 24 '"' C'8; ': * ') - Y.
': * : Z - Y. ' $7 :- @ .
b F; < 6 S J'87 F; 24 '"'
Y 8;% 4 ': b -+. "' * ') - Y.
7 J -' < 3 A6 NO. 24 '"' + 24 '"' K' ” (
* : Z<
NO. @G '% ': 9+ . . ') '8 5 O 2. n <4)
h NO.g - E hX4 NO.g ! >4 3 2. -$) P4 B ': < 3 A6
*$ -$) 9+ h @G NO.g > ?= h . NO.g ?6
N Q 8 \\9 5
+ # *+ )
,- . /0
B - = 9 >. 1 J VN Q 8 \\9 5
B - = 9 >. 1 J VN Q 895
!"#X W 9 , , - D V 5
'A E zD &
I eD •(
<' Z D'A) AIZ D R8,
?6 >A4 < ./ 2. $ 'Z D'J 'A <' Z >4 zk -
* $4$" 6 . - Y. O.
P4 B S R8,
2. S'@Y 4 ?6 BZ A ehData Messageg hhS =- gg P zm -
1 = 4 - 7n 2, 4 D. $ ' ?6 $4$" 3, ' R4 .
* ')
4 I. hhS =- gg 2. hhS =- gg IJ %3 ehOriginatorg hh .RJ gg z&
RA O. < '3 hhS =- gg C'87 8;) R ) ') D. 4$ ' V 6
*$) $ '; $3
2, 4 hhS =- gg $8Z .RJ 2. 8;) ehAddresseeg hhf6 ; gg zŒ
*$) $ '; $3 RA O. < '3 hhS =- gg w 8;) R ) $3
hhS =- gg Œ 7 B 3 3B4 ehIncorporation By Referenceg hhS =- K " gg z
* ') &' ( hhS =- gg 4!" <' Z >4 hkqg - 2E O 'J ') PO
1
B - = 9 >. 1 J VN Q 8 \\9 5
2
B - = 9 >. 1 J VN Q 8 \\9 5
3
B - = 9 >. 1 J VN Q 8 \\9 5
$3 J - Y. J 7 '. @% 4 $% O7 S? zŒ
*$3 ^3 RB, ~ 4 RB, 'J J7 1 : 4
*2. Y T $$ S T '" <' Z - : zl -
4 >4 ') $@+ 4 4 RJ 'J ?6 $$ S <' Z - : zq -
e$) 49=< 4 i4 ) '" 'J ! S =- 'J ?6 4 $@+
*$) , $B K'" 'J - Y. < -' . . R Z ' ?6 P
“E Z Z 4 -$) 2, 4 4 D. $ ' h ,g Z<A S =- &
* ') $@+ -$) 2, 4 4 D. $ ' $) ?6 +%4 A
! $3) S =- 2, 4 < D. < $8E $ -$33 • ;% ?6 Œ
*$ ') $@+ '" 'J
$@+ C'87 ; 4 -+. < . @ +4 i4 ) z
*$) -$) , - 'A E '7 2 'Š - ' i S =-
, 4 A 7 hhS =- gg D . > B BOE $4/ '" O4 ) - : zo -
'6 $4 ') J i4 ) >4 2( 9b $3. ') </ >4!+4 " 9b 3. - Y.
Q hhS =- gg " 9b 3. 34!+4 " *$3 S? hhS =- gg D 7 N4 J
*2) $ '; > , 6 I Z $@B \'E
>ŠAO hhS =- ggz S'. • (
>ŠAO E . T zD R8,
e$) 4 i4 ) $4 >ŠAO T zkv -
*$) , 8(3 -$33 T 2 zP
*$4 A S'IB hhS =- gg -$33 T 24' z&
*$) -$) J 8( - 2( 4 -$33 T I. zŒ
• ;% R Z hhS =- gg </ H ') R8 hhS =- gg X4 '( z
*$) P%
X4 i4 ) 24 2. hhS =- gg >ŠAO E . zkk -
*2. ~ R Z j . S ! S +3 -$) - 7n >ŠAO ?6 .
>ŠAO T E . Q/ Q1 1 49= zS R8,
- 4 A ( x - ' S =- 'J 2. > A ' Q 3. zkm -
</ f Z R ) R “, J hhS =- gg Q1 '"' $ 'Z j . <' A
4
B - = 9 >. 1 J VN Q 8 \\9 5
*
f. 3 IA" 3ŠAO R ' "' hhS =- gg Q1 I '6 zkp -
* ') > B hhS =- gg '3 K']' -$) , : 3A4 1
4' ( • $ -$) $@+ 4 >ŠAO 54 6 4 hhS =- gg I zkr -
'ZSE •Z J ;) I - $@B ,6 4>,6 $@B </ Œ $3 T
^" 3. R Z B 3. Q/ 4 . </ Y " $ ') &' ( < /
*2. Z'E 4 TZ
>ŠAO 5 '. >ŠAO 5 '. >ŠAO hhS =- gg 2 zks -
hhS =- gg 2 IB" <' @3 2 K'A $4 >ŠAO T
*2. - , 'Z @" @" '! hhS =- gg 'A 2 Q 4 '!
2 Q<' Z >4 hkkg - i4 ) 5 O • Q• ;) i.' hhS =- gg zkt -
*2. 2(J < E ') $@+
hhS =- gg S @G • (
>, 6- $E hhS =- gg K" 'Z D R8,
e2. B 4 ' 24 hhS =- K " gg zkl -
* ') > B hhS =- gg N4 J '6 K" ' P
*$) • ;% >) $3 </ R E V 6 K" ' &
*$) V 6 D' Z ' K " K']' hhS =- gg zŒ
hhS =- gg & S R8,
*2. .RJ &' 3 hhS =- gg 4 ' zkq -
>4 .RJ f " $) -$) D . 8;) I . 4 .RJ i.' : P
*2. - '
D. .RJ f " '7 $8 4 -$) !4 ?6 . I. : &
* ')
</ 5 f6 ; ') D. 4 w ) 4j. hhS =- gg zko -
e$4 A RA h-$) D . g ] , > 3G 5 O - &' ( -$) D .
hhS =- gg 4/ $3 S'IB $) -$) 5, ' 4 ,B ) .RJ I . “? Z P
*2. - D. .RJ 2. < A
1 O -$) ) 8;) $Z f6 ; i.' -$) 2, 4 hhS =- gg &
B - = 9 >. 1 J VN Q 8 \\9 5
e ') RA 4 -$ Z 5 O
f6 ; 4 R( 2. S =- D . R( .RJ 4 R( P
*$) -$) 5, ' </ V ?7 </ + 2. S =- 2, 4 R(
I B RJ R( >4 4 ! $) ) 4 R( X4 F .RJ : &
*2. 4 R( 2 ) IJ R( '834 b ' $ '7 4 R(
$ '7 ~? < / ' Z - + Z $3) 4 R( $Z , f6 ; 4 .RJ : zŒ
*'
S =- 2, 4 D. < < 54$8 2, 4 & •= Z'E Q/ zpv -
'A $ 'Z ^ S =- ' ( > 3MA <' Z >4 S @G • ( S @G S D'8, K']'
*2.
5
B - = 9 >. 1 J VN Q 8 \\9 5
* :
*$) $ / N (J $4 S =- zŒ
'7 w' 8;) S =- 4 -$ = $4 S =- K']' • ;) z
*$3 [?J 4 '( 2. 4 • Z S =- $' ) . .
R '( 2. '7 6' i '] 24 < $ ' $4 S =- K']' • ;) z-
*$4 A3 '7 w' 8;) S =- 4 -$ =
^ ) $@ )!= 5 '. w' S =- ^4 ' 4 1 = - 7n ztv -
*$ / $ '7 <' Z >4 hlog - 2. > 4/
</ %, •3L . R Z S =- K']' . . ^" ' 4 . ztk -
S =- <4" D 3 $4 D ' @ 3A4 : , ’ • Q C ;)
* ' $ '7 6' > 4/ <' Z >4 S @G & Œ $3 ' f"' 8;)
S =- 2_ Y S •(
hAuthor,s Right/Copyrightg P ' \'E 24 A D R8,
< Y' \'E <' Z 24 A 2( Q/ h % ] g ^4 ' " L 5 ztm -
&'8 'J Q/ 4% f L A" <' Z kprq‰o‰p &'8 < $3 3 < Y38
kplo‰kv‰r &'8 4 !, S < :$ / $4$= \'E 24 A <' Z kpsm‰o‰mt
$3) S =- fZ Y Q/ I *2. P ' 7 “8(3 S =- 'J
> 3MA - - +4 = 4 1 ! 4 !, S ?6 IA"
5 65 K 7 5 R ) , 2 \'E 24 A
G ‡4 $ %E 24 A - - +4 = 24 A P' 5 i \'E P'
' 9 > 'Z D'A% . 24 A hIntegrated Circuits & Chipsg BOZ
2 Q<' Z " ?J > 4/ kpkv‰r‰k &'8 7 •? 2 Q<' Z - >4
<' Z </ '9 ' </ w'3 ' $ '7kppl‰r‰kr &'8 7 •?
*$) ?. ') •I '8 5, '
< '3 >4 F= hRelated Rightsg 3 2 i \'E zk - 8
\'E R ) $ $) 7 3) hNeighboring Rightg 3 2 " \'E
< :$33 $ ' Q/ < $3 3 \'E IA" P' -? +4 J3 '3B
&'8 > 'Z D'A% $3) F;= i ] .' < . 4'8 'J (YJ
*$3) - >4 - ) ' kpsm‰o‰mt kprq‰o‰p
1
B - = 9 >. 1 J VN Q 8 \\9 5
4 " S @G &
'‡ ? zD • (
b - Y. 4 - Y . '. • ztl -
'( B, & - w R4 . 4 . S =-
f. 4 $4Y < +4 - b 4 . 4 IA I7 $ S =- PZ'
D ' -'" +4 4 '7 54 6 >4 ') </ 4 '7 1 = . A:
< J D -? &' ( S < +4 D ' $3 R 8( 4
2
B - = 9 >. 1 J VN Q 8 \\9 5
3
B - = 9 >. 1 J VN Q 8 \\9 5
4
B - = 9 >. 1 J VN Q 8 \\9 5
ZY %) &
>4 " i 3 2. P_' : zlo -
. '7 ?6 3, ') $ 4‚ @3% = • - •. 3) $3) Q‹ <' Z
> 4/ >4 * ') i n @ i.' <' Z >4 > 4/ 6' E >4 $
- ) ' > 4/ 4 . *$ / $3 '7 " I < 4 f4'8 •= E
*$) $3 '7 @ R4n f <' Z >4
' : ; @3% = <' Z >4 hrmg hpqg ' w' > 4/ P
@< 4 ?. '@A" ! X '% !4 24 4$ < . 4 8Z
*$ . $ '7 < 4 f4'8
: ; @3% = <' Z >4 hslg hstg ' w' > 4/ &
$ '7 < 4 f4'8 @ '% !4 24 4$ < . ?. ) }3 ,
*$ .
1 '/ < 2) $@ @3% = <' Z >4 htvg - w' > 4/ Œ
*$ . $ '7 < 4 f4'8 @ '% !4 24 4$ < . )!=
2 B, 24 A '3 2. P_' : zqv -
! >4 > 4/ 3. . *$4 A 4 ; >4 ! i n $ ^A
f4'8 @ '% !4 24 4$ < . : ~ % @3% =
*$ . $ '7 < 4
7 S =- I < :$33 V 8 < +4 > 6 ; < .RJ zqk -
' %= - 'A $@+ E4 6 $ '7 2 ' 2( • S =- $3Y_' $
*$ A <'8 +4 ; ; X4 O7 ': 'J $34 A @ hBack upg
B - = 9 >. 1 J VN Q 8 \\9 5
, , - D V U"XT L 1 + . 1 5
%4 ! 4 ' $J z&
%4 ! ': RAB ' . 2. . . f4'8 z–
': 4 " RAB ' . 4 $ . f4'8 z
4 " <': ': - ' 2 B, ' -$33 } 3 A ^" < '3 FE Y4 z{
': $J ! R B -'( 'A $ I 27 . 4 3 ': $J 4 $7 4
%4 ': 2. . Y 49= 4 Y ': " 7 ': $J ! I7
'J %4 ! A YI; IA 1 !: . zŒ
* @/ ' 'H S !
4 < '3 <' Z hpkg - K']' ': $J $7 , ['O. zr -
e$ ') > B 4 [) ': $7 < :$3
*$4 A 2 B, ') ' f %4 ': $J ! zP
*$) <' Z hqvg - K']' B.' ! ! >4 zk - 8
4 RE %4 ! S -' ') ' 97 $' . zm - 8
- >4 K']' B.' ! -$) 4 ! 'J >4 $4 A
* ' $ ';
%4 ! X4 ' f ': $J ! z&
*$ S T w' $7 4 . - 'A ': $J
2Q 2 ! X4 RZ $ ' f ': S 2 Q , z–
5 O @/ w' ' 4. ': 'H ': $J C'87 < ] E 2. '7 D E
S $Z 2. - 'A T @/ A $@B ! '. - J RAB ' . i ']
*$4 A
e$ ') > B 4 [) %4 ! 2 'Š P4 _ zs -
f4'8 2@" ') 4 %4 ! ': RAB ' . 2. . @3% = zP
') RAB ' . 2. . " z&
! RAB ' . 2. . f4'8 . z
@/ ' $J 4 < ] E 2 ?J S i4 ) . z
$ ') ~ $ $@+ ': f. 3 B ?6 2 Q < 3 A6 D'8 z{
?6 >4 2(J D
B - = 9 >. 1 J VN Q 8 \\9 5
! N (J IA < 3 A6 D'8 zŒ
$- RA < % $@B V ?7 ! ': D O z•
H ': ' -$33 A V 6 T < J . K?6 z[
!
</ $7 . K?6 i7 <!; X4 . 4 zy
f"' ! >4 2 B, ! IA ^OZ ‘ ( %4 ! zt -
$4 ! ' 'H 'J > 3MA ') PZ' +4 R 4 4 T Z ^"
< 4 ?. '@A" A. Œ > 4/ >4 hsg - hyg $3 Œ $3 1
*$4 A % 3 -$) R6 ': 2. @,
! DO ) <4 ] 2 7 27 = -'( 2 'Š z- 8
': RAB ' . $4 S 2 Q , 4 ! >4 -$) J T < J
*$) -$) $ Z > , 6 > -$) $EB3 Z 4 !
$ ') 4 b F; 4 - + . i.' ' f ! zl -
e ') > B 4 [) ! • .‚ i '] i4 )
i n ^" 2Q' 4 3. . 4 zP
]E V 6 ] E 4 z&
E E( S'I ; $ 4‚ ' i I 8( ~ $ Y c3= , B z–
e 4 i4 ) )!= 1 ' / < 2) $@ 3,
*i 2 B, “( " +% I 8( ~ $ j 3) Y . zk
. RZ $ 4 6 ?6 3, i ) ~$ Y zm
) '/ - 6 ' - A 6 ?6 3, i -' D.
* , 3, !
-$) S? S !, S !, 2;. !@ - A f. 3 4! , < > ‚z
! <. $ 4‚ ' $4 A > AT +! 3, 2 3 '( %4 ! '.
*$) ,: Z %4
* %4 ! i.' -$) > B dI f. 3 B > AT 4 z{
*! ': RAB ' . 2. . >4 $ zŒ
< ]E S $Z ] E . 2 - V _ $3YI %4 ! zk - 8
*$34 A S?
B - = 9 >. 1 J VN Q 8 \\9 5
5
B - = 9 >. 1 J VN Q 8 \\9 5
* : Œ w' 34 - +4 "
'J ) '7 ZV 6S 2Q , IA ! zm - 8
-$) 3 F = $ @A 24 S! 'J - '7 </ i '] 5 6 PI;
* 'A $ '7 S $Z PI; S 2 Q , ' 'H 2 ': RAB ' .
i4 ) ? ': 2. . 5 O '6 ! ' zo -
$4$A R Z %4 ! i.' < ] E 2 ?J $ •= $4$" 3, '(
*$)
> 4/ >4 E i4 ) ? %4 ! $ 4‚ “, J ! ' zkv -
* '$ '7 b 9: R Z ': RAB ' .
< $ '7 I7 2 B, - ' $3 ' b 4 .‹ I zkk -
J 'J >4 4 ': *$34 A ': $J 2Q %4 ! ' 97
$ 4‚ ': >4 I . 4 T -' > 4/ >4 E D'A) Œ 7 ')
* ' $ '7 .‹ < A - Y . R Z “, J <' Z hkvg - K']' Œ 7 $ ')
4 Z'E 4 E E C ;) i.' ' 3 $3 ' S 2 Q , zkm -
' 2, 4 ]E Z'E C ;) T < J! E E C ;) *$ ') 4 b
e$3) 4 i4 ) $4 '% S 2Q , $-
< 4 ?. '@A" 2 B zP
. . <' Z -$) 7 3) 2 A. <4 = 4 S?. S 2I >4 $ z&
Y 3 % = > ) $ z–
E .> Z?7 2 ?J > ) 5 , S$ z
$; ' S$ z{
'A Y _ 2 $7 S zŒ
3, E E( S'I ; $ 4‚ ' ~ $ RZ $ < ' z•
)!= 1 ' / < 2) $@
B 2 A] 4 z[
! $ 4‚ ' & 3 D . c3= 4 ' D . . RZ $ E . > ) zy
?6 3, i F;
': $J , RAB ' . j . B 2 A] < ! K' zk - 8
* ') 3 F=
1
B - = 9 >. 1 J VN Q 8 \\9 5
2
B - = 9 >. 1 J VN Q 8 \\9 5
, , > / > Y 1 + 8 (* 5 5
3
B - = 9 >. 1 J VN Q 8 \\9 5
4
B - = 9 >. 1 J VN Q 8 \\9 5
e B ! h–
>) 'J '7 K' -+. 4 -+. $B NO. X4 !
4 S $Z '7 2 B, - ' “, J $3 ' RAB ' . > A p - 24 w' i4 )
*$34 A </ ': $J B !
! •. S $Z B ! •. < ]E . -+ . z k- 8
*$ ') • . S ! R4n $3 ' ! >4 $ -
RAB ' . B ! •. ]E ': RAB ' . 5 O S$ 'J z m- 8
$' ]E %4 ! i.' ] E -W4 i4 ) '" . -+. ':
$B S ! R4n B ! •. ' D '7 2 B, - '
*$4 A 2, 4 ! •. '
e J'87 ! h
P4 B J'87 F; - Y. ' ': $J ! >4
$3 '7 %4 ! •. ' Z'E A Y 2 ?J •= </ -$)
') f4'8 @ %4 ! i.' J'87 ! 2 ?J i4 ) > 4/ *2, :
*$ . $ '7
$ 4‚ •= B J'87 S ! •. ' zp -
* : J ') f4'8 %4 ! i.' 6' RAB ' .
; C =T ' (< I 4A 1 D (H Z 3 L % 1 5
U
. 6
: e$ 2 ) < BY34n K' 2 < $7 • ' I '6
$33 • $7 4 @/ (Identity Provider) $ -$@ , 4 . 3)
) 2 % - : 4 X4 $' - . 24 '"' X4 *(Service Provider)
< %4 , 4 . 3) -$33 > i.' ?6 2. S $7 < :$33 • *$)
• 24 '"' S $ $7 34 ' $7 -$33 • *$34 A A 2. -$) D .
4 . 3) < :$33 > i.' 2. ?6 j . A8 >4 ) : A8 5 $3
$) 3 A6 ['O. ' $' -$) D . ?6 7 * ') • ,
4 . 3) 24 4$ *$) $ '7 - Y . 24' - Y. ' 1 4 . 3) 24 4$
B - = 9 >. 1 J VN Q 8 \\9 5
>K @ D (H Z 3
>4$ ') :- $ > B @/ X 4 < ! j . . < 3 A6 ['O.
$ ') E I . @G -$) :- $ . X 4 f
* : R ) < 3 A6 ['O. 5 O 24' 4 . 3) S $3 . >4 5 O
P4 B < 3 A6 NO.
$ '" $4$@ '+M Level 1
2. ) $4$@ $( $B Level 2
I7 7< i.' $4$@ $( $B ) 4 $4$@
Level 3
2. " '
2. " ' I7 < 54 6 ) 4 $4$@ Level 4
1 Ni
~ $
kv D . p
h RZ $ g eD L mv D . s p D' Z ' E.
D . p › hkvg Z K' › hqvg~ $ š kvv rv D . kv s -+ .
hkvg E . tv D . kv
› hsvg 4$ RH) › hqvg ~ $ š ksv sv R 4$ IH) < '3
hkvg E . › hkvg A. kv A= A. Z K'
E . › hsvg 4$ RH) › hqvg ~ $ š ksv rv 3. 3)
~$
hmvgs p rv I
› hkvg Z K' › hqvg ~ $ š ksv mv 9:
L$
htvg D . kv mv 3 ':
41 > R
> O
NO.
P4 B S < 3 A6 NO.
':
-$) J .< V 8 ': NO. >4 Level
! Rudimentary
: Z - Y. ' 1
-$) J .< V 8 ': NO. >4 Level
-E Basic
: Z - Y. ' 2
B - = 9 >. 1 J VN Q 8 \\9 5
FE X Y NO.
') S Y k i.' $ ' ': $J P4 _ I Level 1
') S Y m i.' $4 RZ $ ': $J P4 _ Level 2
') S Y p i.' $4 RZ $ ': $J P4 _ Level 3
') S Y p i.' $4 RZ $ ': $J P4 _ Level 4
': - NO.
D.t L $ Level 1
D.r L $ Level 2
D.m L $ Level 3
D.k L $ Level 4
5
B - = 9 >. 1 J VN Q 8 \\9 5
. NO.
4D.p 3 2. . > A . '3 .
Level 1
') S
4D.m 3 2. . > A . '3 .
Level 2
') S
S . 3 2. . > A . '3 .
Level 3
')
S . 3 2. . > A . '3 .
Level 4
')
9:S $3 NO.
$ $ Distinguished name 4@ ': Level 1
$ Distinguished name 4@ ': Level 2
$ Distinguished name 4@ ': Level 3
$ Distinguished name 4@ ': Level 4
V 8 Q E NO.
$3 . Q ': 2, 4 J'87 $ I V 8 $4 4@< Level 1
$3 . Q ': 2, 4 J'87 $ I V 8 $4 4@< Level 2
$3 . Q ': 2, 4 J'87 $ I V 8 $4 4@< Level 3
$3 . Q ': 2, 4 J'87 $ I V 8 $4 4@< Level 4
1
B - = 9 >. 1 J VN Q 8 \\9 5
^4 Z 2 Q $@+ $3 NO.
2 ^4 Z $@+ < $ < 'A • ;% Level 1
') $@+ D . l $4 ! -$) 2 Q^4 Z Level 2
') $@+ D . kv $4 ! -$) 2 Q^4 Z Level 3
') $@+ D . mv $4 ! -$) 2 Q^4 Z Level 4
2
B - = 9 >. 1 J VN Q 8 \\9 5
Uw F > > T D (H Z 3 .
OID NO.
2.16.364.101.1.1.1.1.1 Level 1
2.16.364.101.1.1.1.2.1 Level 2
2.16.364.101.1.1.1.3.1 Level 3
2.16.364.101.1.1.1.4.1 Level 4
/ D (H Z 3
': $J ! X4 $ ') $3 E • R Z ': K' "' PI ; !
2E, ' x *$4 A . - = < 3 A6 NO. X4 % ': 2. . $ '
2 2 $ . * $ '" < 3 A6 ['O. P J' $ . ' @"
High Rudimentary, Basic, Medium < 3 A6 ['O. @G . 2 4 /
*$ ') - S Level1, 2, 3, 4 >4 3 : -'
3
B - = 9 >. 1 J VN Q 8 \\9 5
4
[+ [= 4 5
1. An overview of issues and the deployment of existing ITU-T Recommendations for secure
telecommunications, International Telecommunication Union, ITU-T 2006
3. Chen, U.H. & Barnes, S. 2007, ‘Initial trust and online buyer behaviour’, Industrial
Management & Data Systems, Vol. 107, No. 1, pp. 21-36. Retrieved: April 16, 2007,
from Emerald. (is available at www.emeraldinsight.com/0263-5577.htm)
4. Connolly, Chris & Dijk, Peter van, "Individual Digital Certificates and PKI", available at
www.cyberlawcentre.org/Articles/Cyberspace_May.../DigitalCert_PKI.ppt
5. Corbitt, Brian J., Thanasankit, Theerasak & Yi, Han, 2003, "T rust and e-commerce: a
study of consumer perceptions", Electronic Commerce Research and Applications, 2
(2003), pp.203–215, Retrieved: April 13, 2007, from Elsevier.
6. Datta, A., Hauswirth, M. & Aberer, K. 2003, ‘Beyond “web of trust”: Enabling P2P E-
commerce’, International Conference on E-Commerce, Retrieved: April 25, 2007, from
IEEE.
7. Dayal, S., Landesberg, H. & Zeisser, M. 1999, ‘HOW TO BUILO TRUST ONLINE’,
Marketing & Tchnology, Fall 1999.
9. The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions,
2004
10. Doney PM, Cannon JP, Mullen M. Understanding the influence of national culture on the
development of trust. Academy of Management Review 1998;23(3):601–20.
11. Dongmin K, Izak Benbasat, Trust-related arguments in internet stores: a framework for
evaluation, Journal of Electronic Commerce Research, VOL. 4, NO. 2, 2003.
12. Eastlick, M.A. Lotz, S.L. & Warrington, P. 2006, ‘Understanding online B-to-C
relationships: An integrated model of privacy concerns, trust, and commitment’, Journal
of Business Research 59 (2006), pp. 877–886. Retrieved: April 16, 2007, from Science
Direct.
13. Fan, J.C. 2006, ‘Trust and Electronic Commerce - A Test of an E-Bookstore’,
International Conference on e-Business Engineering. Retrieved: April 25, 2007, from
IEEE.
14. Gao, Y. 2005, ‘Factors influencing user trust in online games’, The Electronic Library,
Vol. 23, No. 5, 2005, pp. 533-538. Retrieved: April 19, 2007, from Emerald. (is available
at www.emeraldinsight.com/0263-4503.htm)
15. Gefen, D. 2000, ‘E-commerce: the role of familiarity and trust’, International Journal of
Management Science, Vol. 28, pp. 725-37. Retrieved: April 12, 2007, from Science
Direct
16. Gefen, D., Karahanna, E. & Straub, D.W. 2003, ‘Trust and TAM in online shopping: an
integrated model’, MIS Quarterly, Vol. 27 No. 1, pp. 51-90. Retrieved: April 16, 2007,
from Emerald.
17. Gefen, D. & Straub, D.W. 2004, ‘Consumer trust in B2C e-Commerce and the
importance of social presence: experiments in e-Products and e-Services’, Omega 32
(2004), pp. 407 – 424. Retrieved: April 10, 2007, from Science Direct
18. Grabner-Krauter, S. & Kaluscha, E.A. 2003, ‘Empirical research in on-line trust: a review
and critical assessment’, Int. J. Human-Computer Studies 58 (2003), pp. 783–812.
Retrieved: April 16, 2007, from Science Direct.
19. Guo, Z. , Okuyama, T. & Finley. Jr M. R. 2005, ‘A New Trust Model for PKI
Interoperability’, Joint International Conference on Autonomic and Autonomous Systems
and International Conference on Networking and Services-2005. Retrieved: April 25,
2007, from IEEE.
20. Harridge-March, S. 2006, ‘Can the building of trust overcome consumer perceived risk
online?’, Marketing Intelligence & Planning, Vol. 24, No. 7, 2006, pp. 746-761.
Retrieved: April 26, 2007, from Emerald. (is available at www.emeraldinsight.com/0263-
4503.htm)
21. Head M, Hassanein K; Trust in e-Commerce: Evaluating the Impact of Third-Party Seals;
Quarterly Journal of Electronic Commerce; 2003.
22. H.-W. Kim, Y. Xu, J. Koh, A comparison of online trust building factors between
potential customers and repeat customers, Journal of the Association for Information
Systems 5 (10) (2004) 392–420.
23. Jarvenpaa, S.L., Tractinsky, N. & Vitale, M. 2000, ‘Consumer trust in an Internet store’,
Information Technology and Management 1 (2000), pp. 45–71.
25. Jøsang, A. Ismail, R.& Boyd, C. 2007, ‘A survey of trust and reputation systems for
online service provision’, Decision Support Systems 43 (2007), pp. 618– 644. Retrieved:
April 16, 2007, from Science Direct.
26. John D. Howard, Longstaff, Thomas A., 1998, A Common Language for
Computer Security Incidents, Unlimited Release Printed October 1998
27. Kaplan, S.E. & Nieschwietz, R.j. 2003, ‘A Web assurance services model of trust for
B2C e-commerce’, International Journal of Accounting, Information Systems 4 (2003),
pp. 95–114. Retrieved: April 13, 2007, from Elsevier.
29. Kim, D.J. Song, Y.I. Braynov, S.B. & Rao, H.R. 2005, ‘A multidimensional trust
formation model in B2C e-commerce: a conceptual framework and content analyses of
academia / practitioner perspectives’, Decision Support Systems 40 (2005), pp. 143– 165.
Retrieved: April 12, 2007, from Science Direct.
30. Kim, D.J. Ferrin, D.L. & Rao, H.R. 2008, ‘A trust-based consumer decision-making
model in electronic commerce: the role of trust, perceived risk, and their antecedents’,
Decision Support Systems 44 (2008), pp. 544– 564. Retrieved: June 20, 2008, from
Science Direct.
31. Kim, H., Xu, Y. & Koh, J. ‘A comparison of online trust building factors between
potential customers and repeat customers’, Journal of the Association for Information
Systems 5 (10) (2004), pp. 392–420. Retrieved: April 19, 2007, from Emerald.
32. Klang, M. 2001, ‘Who do you trust? Beyond encryption, secure e-business’, Decision
Support Systems 31(2001), pp. 293-301. Retrieved: April 16, 2007, from Science Direct.
33. Kochar, Jagdeep S., Application of Digital Signatures: Case Studies, is available at
www.elitex.in/paper2008/jskochar.ppt
34. Kolsaker, A. & payne, C., ‘Engendering trust in e-commerce: a study of gender-based
concerns’ Marketing Intelligence & Planning, Vol. 20, No. 4, 2002, pp. 206-214.
Retrieved: April 19, 2007, from Emerald. (is available at www.emeraldinsight.com/0263-
4503.htm)
35. Koufaris, M. & Hampton-Sosa, W. 2004, ‘The development of initial trust in an online
company by new customers, Information & Management, Vol. 41, pp. 377-97. Retrieved:
April 16, 2007, from Emerald.
36. Lancastre, A. & Lages, L. F. 2006, ‘The relationship between buyer and a B2B e-
marketplace: Cooperation determinants in an electronic market context’, Industrial
Marketing Management 35 (2006), pp. 774 – 789. Retrieved: June 20, 2008, from
Science Direct.
38. Lee, Y. & Trim, P.R.J. 2006, ‘Retail marketing strategy_The role of marketing
intelligence, relationship marketing and trust’, Marketing Intelligence & Planning, Vol.
24, No. 7, 2006, pp. 730-745. Retrieved: April 16, 2007, from Emerald. (is available at
www.emeraldinsight.com/0263-4503.htm)
39. Liao, C. Palvia, P. & Lin, H-N. 2006, ‘The roles of habit and web site quality in e-
commerce’, International Journal of Information Management 26 (2006), pp. 469–483.
Retrieved: April 16, 2007, from Science Direct.
40. Mayer, R.C., Davis, J.H. & Schoorman, F.D. 1995, ‘An integrative model of
organizational trust’, Academy of Management Review, Vol. 20 No. 3, pp. 709-34.
Retrieved: April 16, 2007, from Emerald.
41. McDonough, John, 2003, "Case Study Proposal, Revenue On-Line Service (ROS), Focus
3 –Government", Electronic Records Unit National Archives of Ireland,
42. McKnight, D.H. & Chervany, N.L. 2001, ‘What trust means in e-commerce customer
relationships: an interdisciplinary conceptual typology’, International Journal of
Electronic Commerce, Vol. 6 No. 2, pp. 35-59. Retrieved: April 11, 2007, from Emerald.
43. Merrilees, B. and Frye, M-L. (2003), ‘E-trust: the influence of perceived interactivity on
e-retailing user’, Marketing Intelligence & Planning, Vol. 21, No. 2, pp. 123-8.
Retrieved: April 16, 2007, from Emerald.
44. Millar, T. Mathhew, L.N. Shen, S.Y. & Shaw, M.J. 2005, ‘E-business Management
Models’.
45. Miyamoto, T. & Rexha, N. 2004, ‘Determinants of three facets of customer trust_A
marketing model of Japanese buyer–supplier relationship’, Journal of Business Research
57 (2004), pp. 312– 319. Retrieved: April 25, 2007, from Science Direct.
46. Mossop, S; Trends & Myths of Canadian Internet & eCommerce; presentation material
by Angus Reid Group at Bureau for e-Business Research; 2000.
47. Mui, L., Mohtashemi, M. & Halberstadt, A. 2002, ‘A Computational Model of Trust and
Reputation’, 35th Hawaii International Conference on System Sciences-2002. Retrieved:
May 25, 2007, from IEEE.
48. Muniz, Albert M., Jr., and T.C. O’Guinn (2001), “Brand Community,” Journal of
Consumer Research, 27 (March), 412–32.
49. Murphy, G.B. & Blessinger, A. A. 2003, ‘Perceptions of no-name recognition business to
consumer e-commerce trustworthiness: the effectiveness of potential influence tactics’,
Journal of High Technology Management Research 14 (2003), pp. 71–92. Retrieved:
May 12, 2007, from Science Direct.
50. Pan, Xing, Brian T. Ratchford, and Venkatesh Shankar (2002), “Can Differences in E-
Tailer Prices Be Explained by Service Quality?” Journal of the Academy of Marketing
Science, 30 (4), 433–46.
51. Panduranga, S.N. 2005, ‘Simplifying Mobile Commerce Through A Trusted Transaction
Broker’, ICPWC, Retrieved: April 25, 2007, from IEEE.
55. Ratnasingam P. 2004, ‘The impact of collaborative commerce and trust in Web services’,
The Journal of Enterprise Information Management, Vol. 17, No. 5, 2004, pp. 382-387.
Retrieved: April 16, 2007, from Emerald. (is available at www.emeraldinsight.com/1741-
0398.htm)
56. Roy, M., Dewit, O. & Aubert, B. A. 2001, ‘The impact of interface usability on trust in
Web retailers’, Internet Research: Electronic Networking Applications and Policy, Vol.
11, No. 5, 2001, pp. 388-398. Retrieved: April 19, 2007, from Emerald.
57. Salam,A.F., Iyer, L., Palvia,P. & Singh, R., 2005, ‘TRUST in E-Commerce’,
COMMUNICATIONS OF THE ACM, February 2005/Vol. 48, No. 2. Retrieved: April 22,
2007, from Ebsco.
59. Schaupp, L. C. & Carter, L. 2005, ‘E-voting: from apathy to adoption’, The Journal of
Enterprise Information Management, Vol. 18, No. 5, 2005, pp. 586-601. Retrieved: April
16, 2007, from Emerald. (is available at www.emeraldinsight.com/1468-4527.htm)
60. Schmidt, S., Steele, R., Dillon, T.S. & Chang, E. 2007, ‘Fuzzy trust evaluation and
credibility development in multi-agent systems’, Applied Soft Computing 7 (2007), pp.
492–505. Retrieved: April 23, 2007, from Science Direct.
61. Shankar, V. Urban, G.L. & Sultan, F. 2002, ‘Online trust: a stakeholder perspective,
concepts, implications, and future directions’, Journal of Strategic Information Systems
11 (2002), pp. 325–344. Retrieved: April 25, 2007, from Science Direct.
63. Siala, H. O’Keefe, R.M. & Hone, K.S. 2004, ‘The impact of religious affiliation on trust
in the context of electronic commerce’, Interacting with Computers 16 (2004), pp. 7–27.
Retrieved: April 16, 2007, from Science Direct.
64. Smith, A.D. & Manna, D.R. 2004, ‘Exploring the trust factor in e-medicine’, Online
Information Review, Vol. 28, No. 5, 2004, pp. 346-355. Retrieved: April 16, 2007, from
Emerald. (is available at www.emeraldinsight.com/1468-4527.htm)
66. Stewart, K.J. 2003, 'Trust Transfer on the World Wide Web' , Organization Science, Vol.
14, No. 1. (Jan. - Feb., 2003), pp. 5-17. Retrieved: January 24, 2008, from
http://www.jstor.org/journals/
67. Su, C., Zhang, H. & Bi, F. 2006, ‘A P2P-based Trust Model for E-Commerce’,
International Conference on e-Business Engineering, Retrieved: April 25, 2007, from
IEEE.
68. Sultan, F., Urban G.L., Shankar, V. & Bart, I.Y. 2002, ‘Determinants and Role of Trust in
E-Business: A Large Scale Empirical Study’, MIT Sloan School of Management, Working
Paper 4282-02, December 2002. Retrieved: January 16, 2008, from
http://ssrn.com/abstract_id=380404.
69. Teo, T.S.H & Liu, J. 2007, ‘Consumer trust in e-commerce in the United States,
Singapore and China’, Omega 35 (2007), pp. 22–38. Retrieved: April 12, 2007, from
Science Direct.
70. The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked
Questions, May 3, 2004
72. Urban, G.L., Fareena Sultan, and William Qualls (2000), “Placing Trust at the Center of
Your Internet Strategy,” Sloan Management Review, 42 (1), 39–48.
74. Wang, Y.D. & Emurian, H.H. 2005, ‘An overview of online trust: Concepts, elements,
and implications’, Computers in Human Behavior 21 (2005), pp. 105–125. Retrieved:
April 16, 2007, from Science Direct.
75. Winch, G. & Joyce, P. 2006, ‘Exploring the dynamics of building, and losing,
consumertrust in B2C eBusiness’, International Journal of Retail & Distribution
Management, Vol. 34, No. 7, 2006, pp. 541-555. Retrieved: April 19, 2007, from
Emerald. (is available at www.emeraldinsight.com/0959-0552.htm)
77. Wu, J. & Chang, Y. 2006, ‘Effect of transaction trust on e-commerce relationships
between travel agencies’, Tourism Management 27 (2006), pp. 1253–1261. Retrieved:
May 23, 2007, from Science Direct.
78. www.Escrow.com
79. www.AmexBlue.com
80. www.emarketer.com
81. www.instantssl.com/code-signing/
82. http://publib.boulder.ibm.com/infocenter/hodhelp/v9r0/index.jsp?topic=/com.ibm.hod9.d
oc/help/secclientauth.html
83. http://www.verisign.com/
84. www.cwheroes.org/laureates/government/20045120.pdf
85. Xiong, L. & Liu, L. 2003, ‘A Reputation-Based Trust Model for Peer-to-Peer eCommerce
Communities’, International Conference on E-Commerce, Retrieved: April 25, 2007,
from IEEE.
86. Ying-feng, Z. & Pei-ji, S. 2005, ‘The Model for Consumer Trust in C2C Online Auction’,
Retrieved: April 25, 2007, from IEEE.
87. Yousafzai, S.Y. Pallister, J.G. & Foxall, G.R. 2003, ‘A proposed model of e-trust for
electronic banking’, Technovation 23 (2003), pp. 847–860. Retrieved: April 13, 2007,
from Science Direct.
88. Yu, J., Ha, I., Choi, M. & Rho, J. 2005, ‘Extending the TAM for a t-commerce’,
Information & Management 42 (2005), pp. 965–976. Retrieved: April 25, 2007, from
Science Direct.
89. Zboja, J.J. & Voorhees, C.M. 2006, ‘The impact of brand trust and satisfaction on retailer
repurchase intentions’, Journal of Services Marketing, Vol. 20, No. 5, 2006, pp. 381–390.
Retrieved: April 19, 2007, from Emerald. (is available at www.emeraldinsight.com/0887-
6045.htm)
90. Zhang, W., Liu, L. & Zhu, Y. 2005, ‘A Computational Trust Model for C2C Auctions’.
Retrieved: April 25, 2007, from IEEE.
5[ = UW
5
e– G _ < @ D – G 4 ?6 2Z . +% = *kpqq ) = $ . /J O
HI F 4%