ECPV: EFficient Certificate Path Validation in Public-Key Infrastructure (English)
Free access
- New search for: Halappanavar, M.
- New search for: Mukkamala, R.
- New search for: Halappanavar, M.
- New search for: Mukkamala, R.
In:
Data and Applications Security XVII
5
;
215-228
;
2004
-
ISSN:
- Article/Chapter (Book) / Electronic Resource
-
Title:ECPV: EFficient Certificate Path Validation in Public-Key Infrastructure
-
Contributors:Halappanavar, M. ( author ) / Mukkamala, R. ( author )
-
Published in:Data and Applications Security XVII , 5 ; 215-228IFIP International Federation for Information Processing ; 142, 5 ; 215-228
-
Publisher:
- New search for: Springer US
-
Place of publication:Boston, MA
-
Publication date:2004-01-01
-
Size:14 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Remote Computer Fingerprinting for Cyber Crime InvestigationsNovotny, Jon / Schulte, Dominic / Manes, Gavin / Shenoi, Sujeet et al. | 2004
- 16
-
Improving Damage Assessment Efficacy in Case of Frequent Attacks on DatabasesRagothaman, Prahalad / Panda, Brajendra et al. | 2004
- 33
-
Delivering Services with Integrity Guarantees in Survivable Database SystemsZhang, Jianyong / Liu, Peng et al. | 2004
- 47
-
Certifying Data from Multiple SourcesNuckolls, Glen / Martel, Chip / Stubblebine, Stuart G. et al. | 2004
- 61
-
Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service ModelHacigümüş, Hakan / Iyer, Bala / Mehrotra, Sharad et al. | 2004
- 75
-
Adapting Query Optimization Techniques for Efficient Alert CorrelationNing, Peng / Xu, Dingbang et al. | 2004
- 91
-
Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned DatabasesGudes, Ehud / Rozenberg, Boris et al. | 2004
- 105
-
Privacy Under Conditions of Concurrent Interaction with Multiple PartiesOlivier, Martin S. et al. | 2004
- 119
-
Correlated Data InferenceFarkas, Csilla / Stoica, Andrei G. et al. | 2004
- 133
-
Anti-Tamper DatabasesOzsoyoglu, Gultekin / Singer, David A. / Chung, Sun S. et al. | 2004
- 149
-
Administration Rights in the SDSD-SystemBiskup, Joachim / Leineweber, Thomas / Parthe, Jörg et al. | 2004
- 163
-
Secure Authorisation for Web ServicesIndrakanti, Sarath / Varadharajan, Vijay / Hitchens, Michael / Kumar, Rajat et al. | 2004
- 176
-
A Decentralized Approach for Controlled Sharing of Resources in Virtual CommunitiesFerrari, E. / Squicciarini, A. C. / Bertino, E. et al. | 2004
- 190
-
Supporting Delegation in Secure Workflow Management SystemsAtluri, Vijayalakshmi / Bertino, Elisa / Ferrari, Elena / Mazzoleni, Pietro et al. | 2004
- 205
-
Modifying LDAP to Support PKIChadwick, D. W. / Ball, E. / Sahalayev, M. V. et al. | 2004
- 215
-
ECPV: EFficient Certificate Path Validation in Public-Key InfrastructureHalappanavar, M. / Mukkamala, R. et al. | 2004
- 229
-
Semantics-Aware Perimeter ProtectionCremonini, Marco / Damiani, Ernesto / Samarati, Pierangela et al. | 2004
- 243
-
Systematic Development of a Family of Fair Exchange ProtocolsEzhilchelvan, Paul D. / Shrivastava, Santosh K. et al. | 2004
- 261
-
High-Speed Access Control for XML DocumentsYoon, Jong P. et al. | 2004
- 275
-
Chinese Wall Security Policy ModelsLin, Tsau Young T. Y. et al. | 2004
- 288
-
RBAC Policy Implementation for SQL DatabasesBarker, Steve / Douglas, Paul et al. | 2004
- 302
-
An Administrative Model for Role GraphsWang, He / Osborn, Sylvia L. et al. | 2004
- 316
-
Safety and Liveness for an RBAC/MAC Security ModelPhillips, C. / Demurjian, S. / Ting, T. C. et al. | 2004
- 330
-
Schema Based XML Security: RBAC ApproachZhang, Xinwen / Park, Jaehong / Sandhu, Ravi et al. | 2004
- 344
-
Persistent Versus Dynamic Role MembershipBacon, Jean / Moody, Ken / Chadwick, David / Otenko, Oleksandr et al. | 2004
- 358
-
FlexFlow: A Flexible Flow Control Policy Specification FrameworkChen, Shiping / Wijesekera, Duminda / Jajodia, Sushil et al. | 2004
- 375
-
Data and Applications Security: Past, Present and the FutureThuraisingham, Bhavani et al. | 2004
- 393
-
Digital Forensics: Operational, Legal and Research IssuesPollitt, M. / Caloyannides, M. / Novotny, J. / Shenoi, S. et al. | 2004