• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 354
Next 10 →

Certificate Chain Discovery in SPKI/SDSI

by Dwaine Clarke, Jean-Emile Elien, Carl Ellison, Matt Fredette, Alexander Morcos, Ronald L. Rivest , 2001
"... SPKI/SDSI is a novel public-key infrastructure emphasizing naming, groups, ease-of-use, and flexible authorization. To access a protected resource, a client must present to the server a proof that the client is authorized; this proof takes the form of a "certificate chain " proving that t ..."
Abstract - Cited by 131 (1 self) - Add to MetaCart
SPKI/SDSI is a novel public-key infrastructure emphasizing naming, groups, ease-of-use, and flexible authorization. To access a protected resource, a client must present to the server a proof that the client is authorized; this proof takes the form of a "certificate chain " proving

Optimal Dispersal of Certificate Chains

by Eunjin (ej Jung, Ehab S. Elmallah, Mohamed G. Gouda , 2006
"... Abstract—We consider a network where users can issue certificates that identify the public keys of other users in the network. The issued certificates in a network constitute a set of certificate chains between users. A user u can obtain the public key of another user v from a certificate chain from ..."
Abstract - Cited by 5 (2 self) - Add to MetaCart
Abstract—We consider a network where users can issue certificates that identify the public keys of other users in the network. The issued certificates in a network constitute a set of certificate chains between users. A user u can obtain the public key of another user v from a certificate chain

Optimal Dispersal of Certificate Chains

by unknown authors
"... We consider a network where users can issue certificates that identify the public keys of other users in the network. The issued certificates in a network constitute a set of certificate chains between users. A userÙcan obtain the public key of other userÚfrom a certificate chain from ÙtoÚin the net ..."
Abstract - Add to MetaCart
We consider a network where users can issue certificates that identify the public keys of other users in the network. The issued certificates in a network constitute a set of certificate chains between users. A userÙcan obtain the public key of other userÚfrom a certificate chain from Ùto

SPKI Performance and Certificate Chain Reduction

by Yki Kortesniemi
"... Authorisation certificate based access control owes much of its expressive power to delegation; delegation enables distributed access control management, where the authorisation decisions are manifested as certificate chains. Unfortunately, these chains have to be evaluated every time a right is use ..."
Abstract - Add to MetaCart
Authorisation certificate based access control owes much of its expressive power to delegation; delegation enables distributed access control management, where the authorisation decisions are manifested as certificate chains. Unfortunately, these chains have to be evaluated every time a right

An Algebra for Assessing Trust in Certification Chains

by Audun Jøsang - Proceedings of the Network and Distributed Systems Security Symposium (NDSS'99). The Internet Society , 1999
"... Open networks allow users to communicate without any prior arrangements such as contractual agreement or organisation membership. However, the very nature of open networks makes authenticity difficult to verify. We show that authentication can not be based on public key certificates alone, but also ..."
Abstract - Cited by 112 (13 self) - Add to MetaCart
Open networks allow users to communicate without any prior arrangements such as contractual agreement or organisation membership. However, the very nature of open networks makes authenticity difficult to verify. We show that authentication can not be based on public key certificates alone, but also

Certificate Chain Expressions

by Angela Roles
"... ..."
Abstract - Add to MetaCart
Abstract not found

Distributed Certificate-Chain Discovery in SPKI/SDSI

by Stefan Schwoon Hao, Hao Wang, Somesh Jha, Thomas W. Reps
"... The authorization problem is to decide whether, according to a security policy, some principal should be allowed access to a resource. In the trust-management system SPKI/SDSI, the security policy is given by a set of certificates, and proofs of authorization take the form of certificate chains. T ..."
Abstract - Add to MetaCart
The authorization problem is to decide whether, according to a security policy, some principal should be allowed access to a resource. In the trust-management system SPKI/SDSI, the security policy is given by a set of certificates, and proofs of authorization take the form of certificate chains

Distributed Certificate-Chain Discovery in SPKI/SDSI

by Stefan Schwoon, Hao Wang, Somesh Jha, Thomas W. Reps
"... Abstract. The authorization problem is to decide whether, according to a security policy, some principal should be allowed access to a resource. In the trust-management system SPKI/SDSI, the security policy is given by a set of certificates, and proofs of authorization take the form of certificate c ..."
Abstract - Add to MetaCart
chains. The certificate-chain-discovery problem is to discover a proof of authorization for a given request. Although certificate-chain-discovery algorithms for SPKI/SDSI have been investigated by several researchers, previous work did not address how to perform certificatechain discovery in distributed

Predictive Preemptive Certificate Transfer in Cluster-Based Certificate Chain

by Boukli-hacene Sofiane, Ouali Abdelkader, Bassou Asmaa
"... Abstract: Mobile ad hoc networks are a set of nodes that cooperate and communicate wirelessly. This kind of networks in easy to deploy because there is no need of any pre-existing infrastructure. Security in MANETs is a very important issue and it is hard to use conventional security techniques. Man ..."
Abstract - Add to MetaCart
. Many approaches have been proposed to secure communication in MANETs; most of them are based of public-key certifications which create a multitude of trust communication model. In this paper, we propose an amelioration of a distributed certificate chain that relies on the cluster based routing protocol

An Algorithm of Constructing Certificates Chain Based on the FriendshipPoint Group for P2P Network

by Wang Guoyin, Wang Yuhua
"... Abstract—The authentication and authorization based on CA is not suitable for P2P network because of its centralized control. DHT is efficient to search a required certificate in P2P network, but it is not fit for constructing the certificate chains including many certificates. This paper proposes a ..."
Abstract - Add to MetaCart
Abstract—The authentication and authorization based on CA is not suitable for P2P network because of its centralized control. DHT is efficient to search a required certificate in P2P network, but it is not fit for constructing the certificate chains including many certificates. This paper proposes
Next 10 →
Results 1 - 10 of 354
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University