메뉴 건너뛰기




Volumn 3545 LNCS, Issue , 2005, Pages 100-117

An innovative policy-based cross certification methodology for public key infrastructures

Author keywords

[No Author keywords available]

Indexed keywords

MATHEMATICAL MODELS; PUBLIC POLICY; SECURITY OF DATA; SOCIETIES AND INSTITUTIONS;

EID: 33646025538     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11533733_7     Document Type: Conference Paper
Times cited : (14)

References (24)
  • 2
    • 3042684934 scopus 로고    scopus 로고
    • An extensive comparison between OWA and OFNWA aggregation
    • Naples - Italy
    • Canfora G., Troiano L., "An Extensive Comparison between OWA and OFNWA Aggregation," VIII Sigef Congress, Naples - Italy.2001.
    • (2001) VIII Sigef Congress
    • Canfora, G.1    Troiano, L.2
  • 3
    • 77953767451 scopus 로고    scopus 로고
    • The importance of dealing with uncertainty in the evaluation of software engineering methods and tools
    • ACM Press, Ischia, Italy
    • Canfora G. and Troiano L., The Importance of Dealing with Uncertainty in the Evaluation of Software Engineering Methods and Tools. SEKE 2002. ACM Press, Ischia, Italy. 691-698 (2002)
    • (2002) SEKE 2002 , pp. 691-698
    • Canfora, G.1    Troiano, L.2
  • 4
    • 33646062773 scopus 로고    scopus 로고
    • A tool for Decision Support implementing OFNWA approach: A case study
    • Canfora G., Cerulo L., Preziosi R., Troiano L., A tool for Decision Support implementing OFNWA approach: a case study. SEKE 2003.
    • SEKE 2003
    • Canfora, G.1    Cerulo, L.2    Preziosi, R.3    Troiano, L.4
  • 8
    • 23844470859 scopus 로고    scopus 로고
    • A reference model for security level evaluation: Policy and fuzzy techniques
    • edited by Ajith Abraham, Oklahoma State University, USA and L.C. Jain, University of South Australia, January
    • Casola V., Preziosi R., Rak M., Troiano L., A Reference Model for Security Level Evaluation: Policy and Fuzzy Techniques, in JUCS - Journal of Universal Computer Science - edited by Ajith Abraham, Oklahoma State University, USA and L.C. Jain, University of South Australia, January 2005
    • (2005) JUCS - Journal of Universal Computer Science
    • Casola, V.1    Preziosi, R.2    Rak, M.3    Troiano, L.4
  • 12
    • 23844517883 scopus 로고    scopus 로고
    • An approach to formally compare and query certification practice statements
    • Published Berlin
    • Grill S. An Approach to Formally Compare and Query Certification Practice Statements, Published on Informatik GI Workshop, Berlin 2000
    • (2000) Informatik GI Workshop
    • Grill, S.1
  • 14
    • 0345580236 scopus 로고    scopus 로고
    • A Formalization and evaluation of certificate policies
    • Klobucar T., Jerman-Blazic B., A Formalization and evaluation of certificate policies, Computer Communication 22(1999), 1104-1110
    • (1999) Computer Communication , vol.22 , pp. 1104-1110
    • Klobucar, T.1    Jerman-Blazic, B.2
  • 15
    • 0034159709 scopus 로고    scopus 로고
    • Achieving Interoperability in a multiple-security-policies environment
    • Elsevier Science
    • Kokolakis S.A., Kiountouzis E.A., Achieving Interoperability in a multiple-security-policies environment, Computer & Security. Vol 19, no. 3 pp 267-281, Elsevier Science 2000.
    • (2000) Computer & Security , vol.19 , Issue.3 , pp. 267-281
    • Kokolakis, S.A.1    Kiountouzis, E.A.2
  • 20
    • 0003308762 scopus 로고    scopus 로고
    • Internet X.509 public key infrastructure certificate and CRL profile
    • RFC2459 - Internet X.509 Public Key Infrastructure Certificate and CRL Profile. 1999.
    • (1999) RFC2459
  • 21
    • 0003365059 scopus 로고    scopus 로고
    • Internet X.509 public key infrastructure certificate policy and certification practices framework
    • RFC 3647: Chokhani, S. & Ford, W., 1999. Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework.
    • (1999) RFC , vol.3647
    • Chokhani, S.1    Ford, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.