-
1
-
-
85039240156
-
-
Legge 15 marzo 1997 n. 59, Art. 15, comma 2. Delega al Governo per il conferimento di funzioni e compiti alle regioni ed enti locali, per la riforma della Pubblica Amministrazione e per la semplificazione amministrativa (in Italian).
-
Legge 15 marzo 1997 n. 59, Art. 15, comma 2. Delega al Governo per il conferimento di funzioni e compiti alle regioni ed enti locali, per la riforma della Pubblica Amministrazione e per la semplificazione amministrativa (in Italian).
-
-
-
-
3
-
-
0005060103
-
Public Key Infrastructure Study
-
Final Report, National Institute of Standards and Technology, Gaithersburg
-
S. Berkovits, S. Chokhani, J.A. Furlong, A. Geiter and J.C. Guild, Public Key Infrastructure Study, Final Report, National Institute of Standards and Technology, Gaithersburg, 1994.
-
(1994)
-
-
Berkovits, S.1
Chokhani, S.2
Furlong, J.A.3
Geiter, A.4
Guild, J.C.5
-
5
-
-
84904313967
-
Policy Formalization to combine separate systems into larger connected networks of trust
-
Paris
-
V. Casola, A. Mazzeo, N. Mazzocca and V. Vittorini, Policy Formalization to combine separate systems into larger connected networks of trust, in: Proceedings of Net-Con'2002 Conference, Paris, 2002.
-
(2002)
Proceedings of Net-Con'2002 Conference
-
-
Casola, V.1
Mazzeo, A.2
Mazzocca, N.3
Vittorini, V.4
-
6
-
-
33847366946
-
Toward automatic policy management in distributed security infrastructures, in the book series
-
Nova Science Publishers
-
V. Casola, A. Mazzeo, N. Mazzocca and V. Vittorini, Toward automatic policy management in distributed security infrastructures, in the book series: Parallel and Distributed Scientific and Engineering Computing: Practice and Experience, Nova Science Publishers, 2004.
-
(2004)
Parallel and Distributed Scientific and Engineering Computing: Practice and Experience
-
-
Casola, V.1
Mazzeo, A.2
Mazzocca, N.3
Vittorini, V.4
-
7
-
-
85039188620
-
-
Centro Tecnico per la Rete Unitaria, Sezione Sicurezza, Manuale operativo per il servizio di certificazione di chiavi pubbliche per la rete unitaria della pubblica amministrazione, Versione 1.1, 2001 (in Italian).
-
Centro Tecnico per la Rete Unitaria, Sezione Sicurezza, Manuale operativo per il servizio di certificazione di chiavi pubbliche per la rete unitaria della pubblica amministrazione, Versione 1.1, 2001 (in Italian).
-
-
-
-
8
-
-
85039204511
-
-
I. Curry, Trusted Public-Key Infrastructures, Version 1.2, Entrust Technologies, 0
-
I. Curry, Trusted Public-Key Infrastructures, Version 1.2, Entrust Technologies, www.entrust.com. 2000.
-
-
-
-
9
-
-
0001809810
-
The Ponder policy specification language
-
M. Sloman, ed, UK
-
N. Damianou, N. Dulay, E. Lupu and M. Sloman, The Ponder policy specification language, in: Proc. of Policy Workshop 2001, M. Sloman, ed., UK, 2001.
-
(2001)
Proc. of Policy Workshop 2001
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
10
-
-
85039227546
-
-
Decreto del Presidente del Consiglio dei Ministri, 8 febbraio 1999 Regole tecniche per la formazione, la trasmissione, la conservazione, la duplicazione, la riproduzione e la validazione, anche temporale, dei documenti informatici ai sensi dellarticolo 3, comma 1, del Decreto del Presidente della Repubblica, 10 novembre 1997, n. 513 (in Italian).
-
Decreto del Presidente del Consiglio dei Ministri, 8 febbraio 1999 Regole tecniche per la formazione, la trasmissione, la conservazione, la duplicazione, la riproduzione e la validazione, anche temporale, dei documenti informatici ai sensi dellarticolo 3, comma 1, del Decreto del Presidente della Repubblica, 10 novembre 1997, n. 513 (in Italian).
-
-
-
-
11
-
-
85039231350
-
-
Digital Signature and Confidentiality, Certificate Policies for the Government of Canada Public Key Infrastructure, version 3.02, 1999
-
Digital Signature and Confidentiality, Certificate Policies for the Government of Canada Public Key Infrastructure, version 3.02, 1999.
-
-
-
-
12
-
-
85039182629
-
-
EuroPKI, 2000. Certificate Policy VERSION 1.1 (DRAFT 4), OID: 1.3.6.1.4.1. 5255.1.1.1.
-
EuroPKI, 2000. Certificate Policy VERSION 1.1 (DRAFT 4), OID: 1.3.6.1.4.1. 5255.1.1.1.
-
-
-
-
13
-
-
85039178970
-
-
EuroPKI Project Home
-
EuroPKI Project Home page, www.europki.org.
-
-
-
-
15
-
-
23844517883
-
An approach to formally compare and query certification practice statements
-
Berlin
-
S. Grill, An approach to formally compare and query certification practice statements, in: Informatik GI Workshop, Berlin, 2000.
-
(2000)
Informatik GI Workshop
-
-
Grill, S.1
-
16
-
-
0348207293
-
Security Policies in OSI management: Experiences from the DeTe-Berkom Project BMSec
-
R. Grimm and T. Hetschold, Security Policies in OSI management: experiences from the DeTe-Berkom Project BMSec, in: Proceedings of the JENC6, 1995.
-
(1995)
Proceedings of the JENC6
-
-
Grimm, R.1
Hetschold, T.2
-
17
-
-
0242621248
-
Associating metrics to certification paths
-
Computer Security, ESORICS'92, Springer
-
C. Huitema and A. Tarah, Associating metrics to certification paths, in: Computer Security, ESORICS'92, Lecture Notes in Computer Science, Vol. 648, Springer, 1992, pp. 175-189.
-
(1992)
Lecture Notes in Computer Science
, vol.648
, pp. 175-189
-
-
Huitema, C.1
Tarah, A.2
-
18
-
-
85039215728
-
-
http://www.verisign.com
-
-
-
-
19
-
-
0030677524
-
A logical language for expressing authorizations
-
Oakland, CA
-
S. Jajodia, P. Samarati and VS. Subrahmanian, A logical language for expressing authorizations, in: Proc. IEEE Symp. on Research in Security and Privacy, Oakland, CA, 1997, pp. 31-42.
-
(1997)
Proc. IEEE Symp. on Research in Security and Privacy
, pp. 31-42
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
-
21
-
-
0345580236
-
A formalization and evaluation of certificate policies
-
Elsevier Science
-
T. Klobucar and B. Jerman-Blazic, A formalization and evaluation of certificate policies, in: Computer Communication (22), Elsevier Science, 1999, pp. 1104-1110.
-
(1999)
Computer Communication (22)
, pp. 1104-1110
-
-
Klobucar, T.1
Jerman-Blazic, B.2
-
22
-
-
0034159709
-
Achieving Interoperability in a multiple-security-policies environment
-
S.A. Kokolakis and E.A. Kiountouzis, Achieving Interoperability in a multiple-security-policies environment, Computer & Security 19(3) (2000), 267-281.
-
(2000)
Computer & Security
, vol.19
, Issue.3
, pp. 267-281
-
-
Kokolakis, S.A.1
Kiountouzis, E.A.2
-
23
-
-
33847401286
-
Laurent and Cerami
-
McGraw-Hill
-
St. Laurent and Cerami, Building XML Applications, McGraw-Hill, 1999.
-
(1999)
Building XML Applications
-
-
St1
-
25
-
-
84947294004
-
Modelling public-key infrastructure
-
Computer Security, ESORICS 96, Springer
-
U. Maurer, Modelling public-key infrastructure, in: Computer Security, ESORICS 96, Lecture Notes in Computer Science, Vol. 1146, Springer, 1996, pp. 325-350.
-
(1996)
Lecture Notes in Computer Science
, vol.1146
, pp. 325-350
-
-
Maurer, U.1
-
32
-
-
84945150402
-
SPL: An access control language for security policies with complex constraints
-
San Diego, CA
-
C. Ribeiro, A. Zuquete, P. Ferreira and P. Guedes, SPL: An access control language for security policies with complex constraints, in: Proceedings of Network and Distributed System Security Symposium (NDSS), San Diego, CA, 2001.
-
(2001)
Proceedings of Network and Distributed System Security Symposium (NDSS)
-
-
Ribeiro, C.1
Zuquete, A.2
Ferreira, P.3
Guedes, P.4
-
33
-
-
0037252218
-
Good-Enough Security: Toward a Pragmatic Business-Driven Discipline
-
R.S. Sandhu, Good-Enough Security: Toward a Pragmatic Business-Driven Discipline, IEEE Internet Computing 7(1) (2003), 66-68.
-
(2003)
IEEE Internet Computing
, vol.7
, Issue.1
, pp. 66-68
-
-
Sandhu, R.S.1
-
34
-
-
85039212084
-
-
The Grid's Policy Management Authority, http://www.gridpma.org/
-
The Grid's Policy Management Authority, http://www.gridpma.org/
-
-
-
-
35
-
-
33847372344
-
-
Liguori Editore, Napoli, in Italian
-
G. Tallini, Strutture Geometriche, Spazi Topologici e varietà differenziali Parte prima, Printed in Italy, Liguori Editore, Napoli, 1982 (in Italian).
-
(1982)
Parte prima, Printed in Italy
-
-
Tallini, G.1
Geometriche, S.2
Topologici, S.3
varietà differenziali4
-
36
-
-
85039216183
-
-
Trusted Computer System Evaluation Criteria, Orange Book of Rainbow Series, US Department of Defense
-
Trusted Computer System Evaluation Criteria, Orange Book of Rainbow Series, US Department of Defense.
-
-
-
-
37
-
-
85039220762
-
-
J. Turnbull, Cross-Certification and PKI Policy Networking Version 1.0, Entrust Technologies, 0
-
J. Turnbull, Cross-Certification and PKI Policy Networking Version 1.0, Entrust Technologies, www.entrust.com. 2000.
-
-
-
|