Cover image for Applied Public Key Infrastructure : 4th International Workshop: IWAP 2005.
Applied Public Key Infrastructure : 4th International Workshop: IWAP 2005.
Title:
Applied Public Key Infrastructure : 4th International Workshop: IWAP 2005.
Author:
Zhou, J.
ISBN:
9781607501367
Personal Author:
Physical Description:
1 online resource (276 pages)
Series:
Frontiers in Artificial Intelligence and Applications
Contents:
Title page -- Preface -- Program Committee -- Contents -- PKI Operation & Case Study -- PKI Challenges: An Industry Analysis -- Directory Based Registration in Public Key Infrastructures -- On Automatically Detecting Malicious Imposter Emails -- Non-Repudiation -- Generic Fair Non-Repudiation Protocols with Transparent Off-Line TTP -- Efficient Authorization in Delegation Chains with Strong Non-Repudiation -- No Author-Based Selective Receipt in Certified Email with Tight Trust Requirements -- Authorization & Access Control -- A Generic Protocol for Controlling Access to Mobile Services -- Use of XACML Policies for a Network Access Control Service -- A Delegation Logic Based Authorization Mechanism for Virtual Organizations -- Authentication & Time-Stamping -- An Efficient and Flexible Scheme to Support Biometric-Based and Role-Based Access Control -- A Study on a Framework of Online Biometric Authentication with Verification of Personal Repository -- On Universal Composable Security of Time-Stamping Protocols -- Certificate Validation & Revocation -- Augmented CRL Scheme -- Speeding up X.509 Certificate Path Validation -- A Lightweight Delegated Privileges Revocation Scheme Based on Coding -- Cryptographic Applications -- Hiding Data Sources in P2P Networks -- Efficient Broadcast from Trapdoor Functions -- A Generic Scheme for Zero-Knowledge Sets -- Author Index.
Abstract:
Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, in which many organizations are now leveraging it as part of their core infrastructure system for providing and building security in their businesses. Understanding the challenges and requirements of PKI related operations through the sharing of case studies are critical to supporting the continued research and development of PKI technologies and related systems and applications to further progress and innovate for enhancing future development and evolution of PKI in the enterprises. This publication includes topics such as: PKI Operation & Case Study; Non-repudiation; Authorization & Access Control, Authentication & Time-Stamping, Certificate Validation & Revocation and Cryptographic Applications.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Added Author:

Electronic Access:
Click to View
Holds: Copies: