Nothing Special   »   [go: up one dir, main page]

Park et al., 2000 - Google Patents

Binding identities and attributes using digitally signed certificates

Park et al., 2000

View PDF
Document ID
5641716348657242414
Author
Park J
Sandhu R
Publication year
Publication venue
Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00)

External Links

Snippet

A certificate is digitally signed by a certificate authority (CA) to confirm that the information in the certificate is valid and belongs to the subject. Certificate users can verify the integrity and validity of a certificate by checking the issuing CA's digital signature in the certificate and, if …
Continue reading at profsandhu.com (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Park et al. Binding identities and attributes using digitally signed certificates
Park et al. Role-based access control on the web
Adams et al. Understanding PKI: concepts, standards, and deployment considerations
Adams et al. Understanding public-key infrastructure: concepts, standards, and deployment considerations
Park et al. RBAC on the Web by smart certificates
Hsu et al. Intranet security framework based on short-lived certificates
Selkirk Using XML security mechanisms
Nykänen Attribute certificates in x. 509
Yeh et al. Applying lightweight directory access protocol service on session certification authority
Johnston et al. A use-condition centered approach to authenticated global capabilities: Security architectures for large-scale distributed collaboratory environments
Jancic et al. PKI-Advantages and Obstacles.
Muftic et al. Security architecture for distributed systems
Boeyen et al. Liberty trust models guidelines
Mwakalinga et al. Authorization System in Open Networks based on Attribute Certificates
Chokhani et al. PKI and certificate authorities
Neumann et al. A framework and prototyping environment for a W3 security architecture
Park Secure attribute services on the web
Wright Secure digital archiving of high-value data
VN Authentication and Authorization Models
Boeyen et al. Trust models guidelines
Wright An overview of PKI
Jarrett Investigation into the Features of Public Key Infrastructures
Vandenwauver et al. Securing internet electronic mail
Patriciu et al. Deploying a certification authority for networks security
Sharon Boeyen et al. Liberty Trust Models Guidelines