-
1
-
-
12444337118
-
-
Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA
-
C. Adams and S. Lloyd, Understanding PKI: concepts, standards, and deployment considerations. Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA, 2002.
-
(2002)
Understanding PKI: Concepts, Standards, and Deployment Considerations
-
-
Adams, C.1
Lloyd, S.2
-
2
-
-
77954227912
-
-
[Online]. Available
-
"State & County QuickFacts," 2010. [Online]. Available: http://quickfacts.census.gov/qfd/states/00000.html
-
(2010)
State & County QuickFacts
-
-
-
3
-
-
0005893506
-
-
J. Callas, L. Donnerhacke, H. Finney, D. Shaw, and R. Thayer, "RFC 4880-OpenPGP Message Format," 2007.
-
(2007)
RFC 4880-OpenPGP Message Format
-
-
Callas, J.1
Donnerhacke, L.2
Finney, H.3
Shaw, D.4
Thayer, R.5
-
4
-
-
51049122345
-
-
Internet Engineering Task Force (IETF)
-
D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk, "RFC 5280: Internet X. 509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile," Internet Engineering Task Force (IETF), 2008.
-
(2008)
RFC 5280: Internet X. 509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
-
-
Cooper, D.1
Santesson, S.2
Farrell, S.3
Boeyen, S.4
Housley, R.5
Polk, W.6
-
6
-
-
0003018691
-
High-availability computer systems
-
J. Gray and D. P. Siewiorek, "High-availability computer systems,"Computer, vol. 24, no. 9, pp. 39-48, 1991.
-
(1991)
Computer
, vol.24
, Issue.9
, pp. 39-48
-
-
Gray, J.1
Siewiorek, D.P.2
-
7
-
-
0034313810
-
Integrating security and real-time requirements using covert channel capacity
-
DOI 10.1109/69.895799
-
S. H. Son, R. Mukkamala, and R. David, "Integrating security and realtime requirements using covert channel capacity," Knowledge and Data Engineering, IEEE Transactions on, vol. 12, no. 6, pp. 865-879, 2000. (Pubitemid 32130740)
-
(2000)
IEEE Transactions on Knowledge and Data Engineering
, vol.12
, Issue.6
, pp. 865-879
-
-
Son, S.H.1
Mukkamala, R.2
David, R.3
-
8
-
-
84855846845
-
-
[Online]. Available
-
GridNet, "4G Smart Grid Solution Overview," 2010. [Online]. Available: http://www.grid-net.com/dl/GridNet-SmartGrid-Security-WhitePaper.pdf
-
(2010)
4G Smart Grid Solution Overview
-
-
-
9
-
-
33747803983
-
A decentralised public key infrastructure for customer-to-customer e-commerce
-
DOI 10.1504/IJBPIM.2005.006962
-
K. Aberer, A. Datta, and M. Hauswirth, "A decentralised public key infrastructure for customer-to-customer e-commerce," International Journal of Business Process Integration and Management, vol. 1, no. 1, pp. 26-33, 2005. (Pubitemid 44275383)
-
(2005)
International Journal of Business Process Integration and Management
, vol.1
, Issue.1
, pp. 26-33
-
-
Aberer, K.1
Datta, A.2
Hauswirth, M.3
-
10
-
-
84855857231
-
An overview of PKI trust models
-
R. Perlman, "An overview of PKI trust models," Network, IEEE, vol. 13, no. 6, pp. 38-43, 2002.
-
(2002)
Network, IEEE
, vol.13
, Issue.6
, pp. 38-43
-
-
Perlman, R.1
-
11
-
-
0003593599
-
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen, "SPKI certificate theory," 1999.
-
(1999)
SPKI Certificate Theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
14
-
-
84947429655
-
Modelling Trust Structures for Public Key Infrastructures
-
Information Security and Privacy, ser. L. Batten and J. Seberry, Eds. Springer Berlin / Heidelberg
-
M. Henderson, R. Coulter, E. Dawson, and E. Okamoto, "Modelling Trust Structures for Public Key Infrastructures," in Information Security and Privacy, ser. Lecture Notes in Computer Science, L. Batten and J. Seberry, Eds. Springer Berlin / Heidelberg, 2002, vol. 2384, pp. 203-221.
-
(2002)
Lecture Notes in Computer Science
, vol.2384
, pp. 203-221
-
-
Henderson, M.1
Coulter, R.2
Dawson, E.3
Okamoto, E.4
-
15
-
-
38649141160
-
A New Modified Bridge Certification Authority PKI Trust Model
-
IEEE
-
M. Li, Y. Ren, Z. Wang, J. Xie, and H. Yao, "A New Modified Bridge Certification Authority PKI Trust Model," in Pervasive Computing and Applications, 2006 1st International Symposium on. IEEE, 2007, pp. 23-26.
-
(2007)
Pervasive Computing and Applications, 2006 1st International Symposium on
, pp. 23-26
-
-
Li, M.1
Ren, Y.2
Wang, Z.3
Xie, J.4
Yao, H.5
-
16
-
-
22144434836
-
The case for using Bridge Certificate Authorities for Grid computing
-
DOI 10.1002/spe.689
-
M. Humphrey, J. Basney, and J. Jokl, "The case for using Bridge Certificate Authorities for Grid computing," Software: Practice and Experience, vol. 35, no. 9, pp. 817-826, 2005. (Pubitemid 40972073)
-
(2005)
Software - Practice and Experience
, vol.35
, Issue.9
, pp. 817-826
-
-
Humphrey, M.1
Basney, J.2
Jokl, J.3
-
17
-
-
77952887452
-
Security Technology for Smart Grid Networks
-
A. R. Metke and R. L. Ekl, "Security Technology for Smart Grid Networks," IEEE Transactions on Smart Grid, vol. 1, no. 1, pp. 99-107, 2010.
-
(2010)
IEEE Transactions on Smart Grid
, vol.1
, Issue.1
, pp. 99-107
-
-
Metke, A.R.1
Ekl, R.L.2
-
18
-
-
0035575724
-
The US Federal PKI and the Federal Bridge Certification Authority
-
DOI 10.1016/S1389-1286(01)00244-4, PII S1389128601002444
-
P. Alterman, "The US federal PKI and the federal bridge certification authority," Computer Networks, vol. 37, no. 6, pp. 685-690, 2001. (Pubitemid 33094228)
-
(2001)
Computer Networks
, vol.37
, Issue.6
, pp. 685-690
-
-
Alterman, P.1
-
20
-
-
33746214822
-
Modeling and evaluation of certification path discovery in the emerging global PKI
-
M. Zhao and S. Smith, "Modeling and evaluation of certification path discovery in the emerging global PKI," Public Key Infrastructure, pp. 16-30, 2006.
-
(2006)
Public Key Infrastructure
, pp. 16-30
-
-
Zhao, M.1
Smith, S.2
-
22
-
-
79954605963
-
Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements, NISTIR 7628
-
NIST
-
NIST, "Guidelines for Smart Grid Cyber Security: Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements, NISTIR 7628," 2010.
-
(2010)
Guidelines for Smart Grid Cyber Security
, vol.1
-
-
|