ABSTRACT

Contents 1.1 Introduction .................................................................................................3 1.2 AC Applications ...........................................................................................4 1.3 Use Case ......................................................................................................5 1.4 PKC and AC ................................................................................................6 1.5 PMI and PKI .............................................................................................13 1.6 AC Validation ............................................................................................15 1.7 Putting It All Together ...............................................................................16 1.8 Conclusions ................................................................................................17 References ...........................................................................................................18