GSA Awards Entrust $5M for Hosted PKI Agreement

November 2011
TR2: Terror Response Technology Report;11/23/2011, Vol. 7 Issue 24, p15
Trade Publication
The article reports that Entrust has received a four-year contract worth 4.5 million U.S. dollars from the General Services Administration (GSA) to continue providing hosted Public Key Infrastructure (PKI) services and digital certificates for the Homeland Security initiatives.


Related Articles

  • Single solution eases PKI integration. Andress, Mandy // InfoWorld;8/20/2001, Vol. 23 Issue 34, p40 

    Reveals the components of Entrust Technologies Incorporated's end-to-end public key infrastructure (PKI) technology. Potential benefits from PKI technology; One of the long-standing issues with PKI technology; Advantages and disadvantages of selecting a single vendor for a PKI solution.

  • Developing e-Business Trust. Gerberick, Dahl // Security: Solutions for Enterprise Security Leaders;Sep2001, Vol. 38 Issue 9, p37 

    Focuses on the use of public key infrastructure (PKI) to ensure a strong degree of trust in electronic business transactions. Encryption; Digital certificates for authentication; Trusted online transaction; Considerations when implementing PKI; Issues need to be addressed to achieve network...

  • New Entrust chief looks forward.  // eWeek;04/30/2001, Vol. 18 Issue 17, p34 

    Interviews data security company Entrust Technologies Inc. chief executive officer F. William Conner. Short-term plans; Plan to focus more on the company's tool kits and network management products; Prospects for the public key infrastructure initiative; Future direction of the relationship...

  • Digital Signatures and Certificates. R. Tidd, Ronald; Heesacker, Gary // CPA Journal;May2008, Vol. 78 Issue 5, p60 

    The article deals with ensuring authentication and non-repudiation of digital signatures and certificates. The process for implementing a digital signature requires two main components. The first is the public key infrastructure (PKI), which uses cryptography and generates two mathematically...

  • THE NEW SPANISH ELECTRONIC IDENTITY CARD: DNI-e;. García, J. Espinosa; Encinas, L. Hernández; Queiruga Dios, A. // Proceedings of the International Conference on Information Techn;2007, Vol. 1, p77 

    The new Spanish Electronic Identity Card (DNI-e) provides a modern and secure identifying way for Spanish citizens as well as digital signature capabilities and confidence in Information Society. In this work the main physical (card and chip) and logical (certificates, digital signature, and...

  • AN EFFICIENT METHOD TO MERGE HIERARCHICAL PUBLIC KEY INFRASTRUCTURES.  // International Journal of Computers & Applications (Acta Press);2010, Vol. 32 Issue 4, p442 

    No abstract available.

  • AT RISK. Bromberger, Seth // Information Security;Apr2012, Vol. 14 Issue 3, p38 

    The article discusses the risks in introducing public key infrastructure (PKI) and digital certificates in smart grid and advanced metering infrastructure (AMI) technology. It informs that PKI and AMI were formerly managed manually due to which there was less risk of security breach. It...

  • New Construction of Efficient Certificateless Aggregate Signatures. He Liu; Sijia Wang; Mangui Liang; Yongqian Chen // International Journal of Security & Its Applications;2014, Vol. 8 Issue 1, p411 

    This paper proposes a novel construction of efficient certificateless aggregate signature (CLAS) scheme. On basis of the computational Diffie-Hellman (CDH) assumption, the proposed scheme can be proven existentially unforgeable against adaptive chosen-message attacks. The new scheme also...

  • Locked and loaded. Chickowski, Ericka // SC Magazine: For IT Security Professionals (UK Edition);Apr2007, p44 

    The article discusses the deployment and management of digital certificates in public key infrastructure (PKI). PKI operates through the use of digital certificates and cryptigraphic keys. Although the technology behind PKI has not changed much, experts believe that the renaissance of PKI comes...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics