DOC PREVIEW
MASON ECE 646 - Project Report

This preview shows page 1 out of 4 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 4 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 4 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Project Report On Survey of Software packages supporting Public Key Infrastructure By, Mayur Enjamoori Rohan Misquith1. List of PKI implementations we are planning to compare. a. Baltimore Technologies b. Verisign c. RSA Security d. Entrust e. PTS e-Security Solutions f. Microsoft 2. Detailed description of problems/hypotheses we are planning to investigate. The different software packages that have been considered will be rated depending on the comparative statistics from the survey. With the conclusion of the project, one should be able to decide which software package to choose depending on his requirement. 3. A tentative list of questions we will be seeking an answer to. 1. What applications will use the PKI certificate, and how? 2. How is easy is it to install and maintain PKI softwares? 3. What is the cost ranges for PKI implementations? 4. What are the interoperability issues among PKIs? 5. How well does a PKI implementation scale? 6. What is the process for adding certificates? 7. What is the process for revoking certificates? 8. To what extent is the identity of the user verified? 9. Does it provide a rapid return on investment? 10. Is PKI based on industry standards? 11. What is space occupied by the installed application? 12. What is the speed of operation?4. Procedure for verifying the results of your investigation. 1. Conduct a through investigation of the software and their vendor. 2. Conduct case study of each feature. 3. Comparison of various features of the softwares. 5. The tentative table of contents of our final report. 1. Introduction 1.1 Background 1.2 Scope of Work 1.3 Document Overview 2. Companies to be evaluated For Each Implementation 2.1 Overall System architecture 2.2 Physical Components 2.3 Performance 2.4 Cost 2.5 Security 2.6 Flexibility 2.7 Interoperability 2.8 Scalability 2.9 Speed of operation 3. Development of Comparison chart. 4. Evaluation of each Company Using the comparison chart 4.1 Comparison of Advantages & Disadvantages of each implementation 4.2 Final conclusions 5. PKI Future Scope 6. Time schedule, including intermediate goals to be achieved by the dates of progress reports. 9/26/04: Complete Project Specification 9/30/04: Discussion with Professor 10/06/04: Getting acquainted with PKI 10/13/04: First progress report10/20/04: Complete the gathering of all research resources 10/27/04: Organize the data gathered to incorporate into the outline 11/03/04: Second project report 11/10/04: Begin write up for the report 11/17/04: Third project report 11/24/04: Begin viewgraphs for the oral presentation 12/01/04: Final progress report with the draft version of the final Viewgraph presentation 12/11/04: Project reports submitted to instructor 12/13/04: Review of project reports 12/15/04: Oral presentation of project. References: a) Understanding Pki: Concepts, Standards, and Deployment Considerations by Adams Carlisle, Lloyd Steve. b) Introduction to Public Key Infrastructure (PKI) http://www.articsoft.com/public_key_infrastructure.htm c) Network PKI Bibliographies - PKI article references http://www.infosyssec.net/infosyssec/secpki1.htm d) Public key infrastructure resources http://www.peterindia.net/PKIResources.html e) Public Key Infrastructure Securing the Future of Communication http://www.safenet-inc.com/insights/whitePDF/PKI_PAPER.pdf f) Interoperability issues in PKI http://www.networkcomputing.com/1115/1115f2.html g) Planning for PKI: best practices guide for deploying public key Infrastructure by Russ Housley, Tim Polk h) PKI: Implementing & Managing E-Security by Andrew Nash, Bill Duane, Derek Brink, Celia Joseph I) PKI: A Wiley Tech Brief by Tom Austin Areas of change: The different softwares and the features that are to be compared are tentative and may change during the progress of the project depending on the


View Full Document

MASON ECE 646 - Project Report

Documents in this Course
Load more
Download Project Report
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Project Report and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Project Report 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?