Results 1 - 10
of
354
Certificate Chain Discovery in SPKI/SDSI
, 2001
"... SPKI/SDSI is a novel public-key infrastructure emphasizing naming, groups, ease-of-use, and flexible authorization. To access a protected resource, a client must present to the server a proof that the client is authorized; this proof takes the form of a "certificate chain " proving that t ..."
Abstract
-
Cited by 131 (1 self)
- Add to MetaCart
SPKI/SDSI is a novel public-key infrastructure emphasizing naming, groups, ease-of-use, and flexible authorization. To access a protected resource, a client must present to the server a proof that the client is authorized; this proof takes the form of a "certificate chain " proving
Optimal Dispersal of Certificate Chains
, 2006
"... Abstract—We consider a network where users can issue certificates that identify the public keys of other users in the network. The issued certificates in a network constitute a set of certificate chains between users. A user u can obtain the public key of another user v from a certificate chain from ..."
Abstract
-
Cited by 5 (2 self)
- Add to MetaCart
Abstract—We consider a network where users can issue certificates that identify the public keys of other users in the network. The issued certificates in a network constitute a set of certificate chains between users. A user u can obtain the public key of another user v from a certificate chain
Optimal Dispersal of Certificate Chains
"... We consider a network where users can issue certificates that identify the public keys of other users in the network. The issued certificates in a network constitute a set of certificate chains between users. A userÙcan obtain the public key of other userÚfrom a certificate chain from ÙtoÚin the net ..."
Abstract
- Add to MetaCart
We consider a network where users can issue certificates that identify the public keys of other users in the network. The issued certificates in a network constitute a set of certificate chains between users. A userÙcan obtain the public key of other userÚfrom a certificate chain from Ùto
SPKI Performance and Certificate Chain Reduction
"... Authorisation certificate based access control owes much of its expressive power to delegation; delegation enables distributed access control management, where the authorisation decisions are manifested as certificate chains. Unfortunately, these chains have to be evaluated every time a right is use ..."
Abstract
- Add to MetaCart
Authorisation certificate based access control owes much of its expressive power to delegation; delegation enables distributed access control management, where the authorisation decisions are manifested as certificate chains. Unfortunately, these chains have to be evaluated every time a right
An Algebra for Assessing Trust in Certification Chains
- Proceedings of the Network and Distributed Systems Security Symposium (NDSS'99). The Internet Society
, 1999
"... Open networks allow users to communicate without any prior arrangements such as contractual agreement or organisation membership. However, the very nature of open networks makes authenticity difficult to verify. We show that authentication can not be based on public key certificates alone, but also ..."
Abstract
-
Cited by 112 (13 self)
- Add to MetaCart
Open networks allow users to communicate without any prior arrangements such as contractual agreement or organisation membership. However, the very nature of open networks makes authenticity difficult to verify. We show that authentication can not be based on public key certificates alone, but also
Distributed Certificate-Chain Discovery in SPKI/SDSI
"... The authorization problem is to decide whether, according to a security policy, some principal should be allowed access to a resource. In the trust-management system SPKI/SDSI, the security policy is given by a set of certificates, and proofs of authorization take the form of certificate chains. T ..."
Abstract
- Add to MetaCart
The authorization problem is to decide whether, according to a security policy, some principal should be allowed access to a resource. In the trust-management system SPKI/SDSI, the security policy is given by a set of certificates, and proofs of authorization take the form of certificate chains
Distributed Certificate-Chain Discovery in SPKI/SDSI
"... Abstract. The authorization problem is to decide whether, according to a security policy, some principal should be allowed access to a resource. In the trust-management system SPKI/SDSI, the security policy is given by a set of certificates, and proofs of authorization take the form of certificate c ..."
Abstract
- Add to MetaCart
chains. The certificate-chain-discovery problem is to discover a proof of authorization for a given request. Although certificate-chain-discovery algorithms for SPKI/SDSI have been investigated by several researchers, previous work did not address how to perform certificatechain discovery in distributed
Predictive Preemptive Certificate Transfer in Cluster-Based Certificate Chain
"... Abstract: Mobile ad hoc networks are a set of nodes that cooperate and communicate wirelessly. This kind of networks in easy to deploy because there is no need of any pre-existing infrastructure. Security in MANETs is a very important issue and it is hard to use conventional security techniques. Man ..."
Abstract
- Add to MetaCart
. Many approaches have been proposed to secure communication in MANETs; most of them are based of public-key certifications which create a multitude of trust communication model. In this paper, we propose an amelioration of a distributed certificate chain that relies on the cluster based routing protocol
An Algorithm of Constructing Certificates Chain Based on the FriendshipPoint Group for P2P Network
"... Abstract—The authentication and authorization based on CA is not suitable for P2P network because of its centralized control. DHT is efficient to search a required certificate in P2P network, but it is not fit for constructing the certificate chains including many certificates. This paper proposes a ..."
Abstract
- Add to MetaCart
Abstract—The authentication and authorization based on CA is not suitable for P2P network because of its centralized control. DHT is efficient to search a required certificate in P2P network, but it is not fit for constructing the certificate chains including many certificates. This paper proposes
Results 1 - 10
of
354