22. Public Key Cryptography Complimentary Algorithms are used to encrypt and decrypt documents @#@#@$$56455908283923542#$@$#%$%$^& Encryption key Decryption key Unreadable Format
23. Public Key Infrastructure in Action Public Key Private Key Secure Transmission Signatures Decrypting Encrypting Encrypting Decrypting
24. Report Encryption Algorithm Digitally Signed An individual digitally signs a document using the private key component of his certificate. Digital Signatures Private key
25. Authentication and Verification The individual’s public key, published by the CA decrypts and verifies the digital signature. Digitally Signed Public Key Decryption Algorithm
33. XML Schema From the W3C: http://www.w3.org/1999/05/06-xmlschema-1/ … define and describe a class of XML documents by using these constructs to constrain and document the meaning, usage and relationships of their constituent parts: datatypes, elements and their content, attributes and their values, entities and their contents and notations. Schema constructs may also provide for the specification of implicit information such as default values. Schemas are intended to document their own meaning, usage, and function through a common documentation vocabulary. Business Plan Schema
34.
35.
36.
37. Public Digital Certificate In order to obtain access to Community Right to Know Data, individuals first obtain digital Certificates. Applying PKI to Public Access
38. Public After contributing a certificate to gain access, The individual’s certificate can be cross-referenced with other security databases to monitor suspect individuals. Digital Certificates Agency