scholarly journals Public Key Infrastructure and Digital Signature Legislation: Ten Public Policy Questions

2017 ◽  
Author(s):  
C. Bradford Biddle

Following the lead of the State of Utah, numerous states and several foreign countries have enacted “digitalsignature” legislation aimed at promoting the development of a public key infrastructure (PKI). While PKIlegislation has acquired significant momentum, it is not clear that lawmakers have carefully considered thepublic policy implications and long-term consequences of these laws. This article surveys ten public policyissues implicated by digital signature legislation.

2017 ◽  
Author(s):  
C. Bradford Biddle

On March 9, 1995, the Utah Digital Signature Act (the “Utah Act”) was signed into law.1 Complex and ambitious, the Utah Act is intended to promote the use of digital signatures on computer-based documents and to facilitate electronic commerce.2 The Utah Act implements an infrastructure in which computer users utilize “certification authorities,” online databases called repositories, and public-key encryption technology in order to “sign” electronic documents in a legally binding fashion. In addition to setting out a regulatory scheme designed to implement this infrastructure, the Utah Act provides certain digital signatures with legal status as valid signatures and addresses a variety of issues relating to the status of digitally-signed electronic documents in contract and evidence law.


Author(s):  
G. M. Muftakhova ◽  
N. A. Bolshakov ◽  
E. Yu. Ilyina

This article is devoted to the analysis of problems associated with the state of the musculoskeletal system in patients who survived malignant neoplasms in childhood. The main diseases and pathological conditions that can develop in this population are considered. The risks of pathological changes in the musculoskeletal system, treatment and prevention are described. The issues of long-term consequences after limb amputation, organ-preserving operations, osteonecrosis, scoliosis, osteoporosis are separately analyzed.


Author(s):  
Manuel Mogollon

In public-key encryption, the secrecy of the public key is not required, but the authenticity of the public key is necessary to guarantee its integrity and to avoid spoofing and playback attacks. A user’s public key can be authenticated (signed) by a certificate authority that verifies that a public key belongs to a specific user. In this chapter, digital certificates, which are used to validate public keys, and certificate authorities are discussed. When public-key is used, it is necessary to have a comprehensive system that provides public key encryption and digital signature services to ensure confidentiality, access control, data integrity, authentication, and non-repudiation. That system, public-key infrastructure or PKI, is also discussed in this chapter.


Vulcan ◽  
2020 ◽  
Vol 8 (1) ◽  
pp. 100-124
Author(s):  
Adam Givens

Abstract This article analyzes the groundbreaking 1952 plan by US Army leadership to develop a sizeable cargo helicopter program in the face of interservice opposition. It examines the influence that decision had in the next decade on the Army, the helicopter industry, and vtol technology. The Army’s procurement of large helicopters that could transport soldiers and materiel was neither a fait accompli nor based on short-term needs. Rather, archival records reveal that the decision was based on long-range concerns about the postwar health of the helicopter industry, developing the state of the art, and fostering new doctrinal concepts. The procurement had long-term consequences. Helicopters became central to Army war planning, and the ground service’s needs dictated the next generation of helicopter designs. That technology made possible the revolutionary airmobility concept that the Army took into Vietnam and also led to a flourishing commercial helicopter field.


2020 ◽  
pp. 000169932092091
Author(s):  
Limor Gabay-Egozi ◽  
Meir Yaish

Vocational and academic curricula are said to hold both short-term and long-term consequences for economic outcomes. The literature on this topic, however, fails to address the long-term consequences of educational tracking. Just as important, this literature did not examine returns to high-school tracking within levels of further education. This paper aims to fill these gaps in the literature. Utilizing longitudinal data of Israeli men and women who graduated high school in the late 1980s and entered the labor market in the early 1990s, we examine their earning trajectories throughout age 50 in 2013. The results indicate that for men without college degrees, vocational education provides pay premiums at labor-market entry. With time, however, these earnings’ premiums decline and diminish. A similar pattern characterizes degree holders, though the decline in the pay premiums is less steep when compared to men without a college degree. For women we do not find similar vocational effects. Taken together, our results indicate that the more substantial differences in earnings trajectories in Israel, among men and women alike, are associated with level of education and not with high-school tracks. The theoretical and potential policy implications of these findings are discussed.


2006 ◽  
Vol 58 (1-2) ◽  
pp. 36-66
Author(s):  
Svetlana Djurdjevic-Lukic

This paper explores the problem of defining a weak state and the indicators for assessment of a state's strength. The author argues that there is no clear conception because so many different phenomena are attributed to state weakness. State weakness is observed in very different contexts - from geopolitical, to societal, to administrational efficiency. The indicators proposed are not precise even within each of three separate clusters of framing state weakness detected here. Related scholarship is so diversified that term ' weak state' suffers from considerable conceptual vagueness. All-inclusiveness of the concept might provide for various levels of intrusiveness, and hence bears long-term policy implications and practical consequences, for proclaiming of a state weak offer a basis for various forms of foreign interventions.


2017 ◽  
Author(s):  
C. Bradford Biddle

The argument goes something like this: Internet commerce is hampered by the authentication problem. There is no reliable way to ensure that the sender of an electronic transmission is in fact who they purport to be. Digital signatures, supported by a “public key infrastructure” of certification authorities (CAs) and certificate databases, can solve this authentication problem. CAs will not emerge under the current legal regime, however, because they face uncertain and potentially immense liability exposure. Additionally, the legal status of digitally signed documents is unclear. Therefore, legislation is needed which defines and limits CA liability and which establishes the legality of digitally signed documents. Such legislation will solve the authentication problem and result in robust Internet commerce.


HAMUT AY ◽  
2018 ◽  
Vol 5 (2) ◽  
pp. 95
Author(s):  
Fresia Yanina Holguín García

El análisis descriptivo del funcionamiento de la arquitectura de frma digital con base en infraestructura de clave pública determinó el objetivo central de toda la investigación, por ello se expusieron las responsabilidades, que cada Autoridad de Certifcación ejerce en su proceso de creación y verifcación, para garantizar la autenticidad, integridad y no repudio de la información transmitida. La metodología utilizada es la documental a través de la revisión bibliográfca de los principales conceptos de frma digital, criptografía y PKI obtenida de repositorios, bibliotecas digitales, base de datos de libre acceso y Google Académico.A partir del estudio realizado se puede concluir que la frma digital con base en la infraestructura de clave pública es un proceso transparente que genera fabilidad tanto al emisor como al receptor de que las claves generadas corresponden a sus legítimos propietarios, pero es necesario que esté amparada por un marco legislativo adecuado, se emplee un hardware y software sofsticado.


Author(s):  
Hannah Gill

This chapter considers the reception of migrants as an introduction to issues of demographic change and economic transition in the state. Using Alamance County as a case study, this chapter discusses how immigration has reopened debates on race, resources, and diversity in the South. It examines the impact of local deportation policies on Latino communities and considers long-term consequences for the county and state as a whole.


Sign in / Sign up

Export Citation Format

Share Document