메뉴 건너뛰기




Volumn 27, Issue 5, 2005, Pages 467-478

Specification and design of advanced authentication and authorization services

Author keywords

Authentication; Authorization; Business Process Model; PKI; PMI; Privacy; X.509 Certificates

Indexed keywords

COMPUTER SOFTWARE; DATA PRIVACY; INTERNET; MATHEMATICAL MODELS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 17744394269     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csi.2005.01.005     Document Type: Article
Times cited : (23)

References (17)
  • 5
    • 0003765587 scopus 로고    scopus 로고
    • U.S. Dept. of Commerce, National Bureau of Standards and Technology, August
    • National Institute of Standards and Technology, "Common Criteria for Information and Technology Security Evaluation", U.S. Dept. of Commerce, National Bureau of Standards and Technology, August, 1999.
    • (1999) Common Criteria for Information and Technology Security Evaluation
  • 10
    • 0342520920 scopus 로고    scopus 로고
    • ConGolog, a concurrent programming language based on situation Calculus
    • G. de Giacomo, Y. Lésperance, and H. Levesque ConGolog, a concurrent programming language based on situation Calculus Artificial Intelligence 121 1-2 2000 109 169
    • (2000) Artificial Intelligence , vol.121 , Issue.1-2 , pp. 109-169
    • De Giacomo, G.1    Lésperance, Y.2    Levesque, H.3
  • 14
    • 0003308762 scopus 로고    scopus 로고
    • Internet X.509 public key infrastructure certificate and CRL profile
    • Network Working Group, Internet Engineering Task Force, January
    • R. Housley, W. Ford, W. Polk, D. Solo, "Internet X.509 Public Key Infrastructure Certificate and CRL Profile", Request for Comments 2459, Network Working Group, Internet Engineering Task Force, January 1999.
    • (1999) Request for Comments , vol.2459
    • Housley, R.1    Ford, W.2    Polk, W.3    Solo, D.4
  • 16
    • 8344266879 scopus 로고    scopus 로고
    • Authentication and authorization infrastructures: A comparative survey
    • Elsevier
    • J. Lopez, R. Oppliger, and G. Pernul Authentication and authorization infrastructures: a comparative survey Computers and Security vol. 23 (7) 2004 (October) Elsevier 578 590
    • (2004) Computers and Security , vol.237 , pp. 578-590
    • Lopez, J.1    Oppliger, R.2    Pernul, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.