Description
Provide an outline of the technological infrastructure of the digital certificates, overview the most important business cases of their usages, investigate the various vulnerabilities, analyse the
exploitation techniques that are known and, finally, provide a framework of mitigation and prevention methods. The study is based on the reports of the software industry analysts and the
requirements of modem distributed information systems. Deliverables of good practices and up-to-date technical approaches will be given.