메뉴 건너뛰기




Volumn 3545 LNCS, Issue , 2005, Pages 118-134

Modeling public key infrastructures in the real world

Author keywords

[No Author keywords available]

Indexed keywords

COMPLEX DISTRIBUTED SYSTEMS; KEY-HOLDER; PUBLIC KEY INFRASTRUCTURES; TRUST JUDGMENTS;

EID: 33646061645     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11533733_8     Document Type: Conference Paper
Times cited : (20)

References (26)
  • 2
    • 84982899264 scopus 로고    scopus 로고
    • The role of trust management in distributed systems
    • Lecture Notes in Computer Science
    • M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis. The Role of Trust Management in Distributed Systems. Secure Internet Programming, 1603:185-210, 1999. Lecture Notes in Computer Science.
    • (1999) Secure Internet Programming , vol.1603 , pp. 185-210
    • Blaze, M.1    Feigenbaum, J.2    Ioannidis, J.3    Keromytis, A.4
  • 3
    • 0037362986 scopus 로고    scopus 로고
    • Role-based access control with X.509 attribute certificates
    • March-April
    • D. Chadwick, A. Otenko, and E. Ball. Role-Based Access Control with X.509 Attribute Certificates. IEEE Internet Computing, March-April 2003.
    • (2003) IEEE Internet Computing
    • Chadwick, D.1    Otenko, A.2    Ball, E.3
  • 4
    • 84948391696 scopus 로고    scopus 로고
    • A model of certificate revocation
    • Phoenix, Arizona, USA, December. IEEE Computer Society
    • D. Cooper. A Model of Certificate Revocation. In 15th Annual Computer Security Applications Conference (ACSAC '99), pages 256-264, Phoenix, Arizona, USA, December 1999. IEEE Computer Society.
    • (1999) 15th Annual Computer Security Applications Conference (ACSAC '99) , pp. 256-264
    • Cooper, D.1
  • 5
    • 0033295882 scopus 로고    scopus 로고
    • The nature of a usable pki
    • C. Ellison. The nature of a usable pki. Computer Networks, pages 823-830, 1999.
    • (1999) Computer Networks , pp. 823-830
    • Ellison, C.1
  • 8
    • 0038150613 scopus 로고    scopus 로고
    • An internet attribute certificate profile for authorization
    • April
    • S. Farrell and R. Housley. An Internet Attribute Certificate Profile for Authorization. IETF RFC 3281, April 2002.
    • (2002) IETF RFC , vol.3281
    • Farrell, S.1    Housley, R.2
  • 10
    • 0011255177 scopus 로고    scopus 로고
    • Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile
    • April
    • R. Housley, W. Polk, W. Ford, and D. Solo. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. IETF RFC 3280, April 2002.
    • (2002) IETF RFC , vol.3280
    • Housley, R.1    Polk, W.2    Ford, W.3    Solo, D.4
  • 11
    • 84902290299 scopus 로고    scopus 로고
    • A formal semantics for SPKI
    • Proceedings of the Sixth European Symposium on Research in Computer Security (ESORICS 2000). Springer-Verlag, October
    • J. Howell and D. Kotz. A formal semantics for SPKI. In Proceedings of the Sixth European Symposium on Research in Computer Security (ESORICS 2000), volume 1895 of Lecture Notes in Computer Science, pages 140-158. Springer-Verlag, October 2000.
    • (2000) Lecture Notes in Computer Science , vol.1895 , pp. 140-158
    • Howell, J.1    Kotz, D.2
  • 12
    • 84958063551 scopus 로고    scopus 로고
    • On certificate revocation and validation
    • Proceedings of the Second International Conference on Financial Cryptography (FC'98). Springer-Verlag
    • P. Kocher. On Certificate Revocation and Validation. In Proceedings of the Second International Conference on Financial Cryptography (FC'98), volume 1465 of LNCS, pages 172-177. Springer-Verlag, 1998.
    • (1998) LNCS , vol.1465 , pp. 172-177
    • Kocher, P.1
  • 13
    • 0033749074 scopus 로고    scopus 로고
    • Reasoning about public-key certification: On bindings between entities and public keys
    • R. Kohlas and U. Maurer. Reasoning About Public-Key Certification: On Bindings Between Entities and Public Keys. Journal on Selected Areas in Communications, pages 551-560, 2000.
    • (2000) Journal on Selected Areas in Communications , pp. 551-560
    • Kohlas, R.1    Maurer, U.2
  • 16
    • 0038825043 scopus 로고    scopus 로고
    • Beyond proof-of-compliancc: Safety and availability analysis in trust management
    • IEEE Computer Society Press, May
    • N. Li, W. Winsborough, and J. Mitchell. Beyond Proof-of-compliancc: Safety and Availability Analysis in Trust Management. In Proceedings of 2003 IEEE Symposium on Security and Privacy, pages 123-139. IEEE Computer Society Press, May 2003.
    • (2003) Proceedings of 2003 IEEE Symposium on Security and Privacy , pp. 123-139
    • Li, N.1    Winsborough, W.2    Mitchell, J.3
  • 19
    • 0003344055 scopus 로고    scopus 로고
    • X.509 internet public key infrastructure online certificate status protocol
    • June
    • A. Malpani, S. Galperin, M. Mayers, R. Ankney, and C. Adams. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol. RFC2560, http://www.ietf.org/rfc/rfc2560.txt, June 1999.
    • (1999) RFC2560
    • Malpani, A.1    Galperin, S.2    Mayers, M.3    Ankney, R.4    Adams, C.5
  • 20
    • 0000926365 scopus 로고    scopus 로고
    • Modelling a public-key infrastructure
    • Springer-Verlag LNCS
    • U. Maurer. Modelling a Public-Key Infrastructure. In ESORICS. Springer-Verlag LNCS, 1996.
    • (1996) ESORICS
    • Maurer, U.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.