answersLogoWhite

0

Two doors west of the old Bank of America Building on Main Street.

User Avatar

Wiki User

12y ago

What else can I help you with?

Continue Learning about Computer Science

What is a distributed trust model?

Three basic types of distributed trust models are: Hierarchical trust model: Here one root Certificate Authority (CA) and one or more subordinate CAs will be present. The subordinate CAs provide redundancy and load balancing. The root CA is usually off-line. Here even if a subordinate CA is compromised, the root CA can revoke the subordinate CA, thus providing redundancy. Web of Trust: Here CAs form peer-to-peer relationship. This model is difficult to manage as the number of CAs grow larger. This kind of trust relationship may happen when different divisions of a company have different CAs, and need to work together. Here CAs must be configured to trust one another. Bridge CA (BCA) architecture: This architecture overcomes the complexity involved with Web of Trust model. A "bridge CA" acts as the central co-ordinate point. All other CAs (known as principals) trust the "bridge" CA.


What is meant by CA Domain when it comes to computers?

A CA domain is known as an entity that issue digital certificates. These digital certificates certifies the ownership of a public key by the names subjects of the certificate.


What is guyar.com about?

Either a town in Turkmenhstan or a 4.0 middle school student in Lafayette, CA.


What is amswsigscan?

amswsigsccan.exe is the Compuater Associates (CA) Unicenter DSM Software Signature Scanner


What is able to identify users with public key infrastructure?

I'm not certain of the intent of the question but it sounds like what is being asked is how you can know the actual identity of someone from their public key - i.e. how you can know that the public key really belongs to the person it purports to belong to. PKI (public key infrastructure) is one way to establish with reasonable certainty that a key really belongs to the entity that is claimed. PKI uses a system of Certificate Authorities (CA) and Registration Authorities (RA). At the top of the chain is the Registration Authority that everyone trusts. Users register their public keys with the RA. CA's also register their certificates withe the RA along with proof that they are who they say they are. CA's are repositories of public keys that the public can access. They sign the keys with their own certificates vouching for the identity of the public key owner. The identity of the CA may, in turn, be vouched for by an RA or higher CA who sign the certificate of that particular CA.