Park et al., 2000 - Google Patents
Binding identities and attributes using digitally signed certificatesPark et al., 2000
View PDF- Document ID
- 5641716348657242414
- Author
- Park J
- Sandhu R
- Publication year
- Publication venue
- Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00)
External Links
Snippet
A certificate is digitally signed by a certificate authority (CA) to confirm that the information in the certificate is valid and belongs to the subject. Certificate users can verify the integrity and validity of a certificate by checking the issuing CA's digital signature in the certificate and, if …
- 230000002567 autonomic 0 abstract description 18
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Park et al. | Binding identities and attributes using digitally signed certificates | |
Park et al. | Role-based access control on the web | |
Adams et al. | Understanding PKI: concepts, standards, and deployment considerations | |
Adams et al. | Understanding public-key infrastructure: concepts, standards, and deployment considerations | |
Park et al. | RBAC on the Web by smart certificates | |
Hsu et al. | Intranet security framework based on short-lived certificates | |
Selkirk | Using XML security mechanisms | |
Nykänen | Attribute certificates in x. 509 | |
Yeh et al. | Applying lightweight directory access protocol service on session certification authority | |
Johnston et al. | A use-condition centered approach to authenticated global capabilities: Security architectures for large-scale distributed collaboratory environments | |
Jancic et al. | PKI-Advantages and Obstacles. | |
Muftic et al. | Security architecture for distributed systems | |
Boeyen et al. | Liberty trust models guidelines | |
Mwakalinga et al. | Authorization System in Open Networks based on Attribute Certificates | |
Chokhani et al. | PKI and certificate authorities | |
Neumann et al. | A framework and prototyping environment for a W3 security architecture | |
Park | Secure attribute services on the web | |
Wright | Secure digital archiving of high-value data | |
VN | Authentication and Authorization Models | |
Boeyen et al. | Trust models guidelines | |
Wright | An overview of PKI | |
Jarrett | Investigation into the Features of Public Key Infrastructures | |
Vandenwauver et al. | Securing internet electronic mail | |
Patriciu et al. | Deploying a certification authority for networks security | |
Sharon Boeyen et al. | Liberty Trust Models Guidelines |