Recertification: A Technique to Improve Services in PKI (English)
Free access
- New search for: Mukkamala, Ravi
- New search for: Das, Satyam
- New search for: Halappanavar, Mahantesh
- New search for: Mukkamala, Ravi
- New search for: Das, Satyam
- New search for: Halappanavar, Mahantesh
In:
Research Directions in Data and Applications Security
7
;
259-270
;
2003
- Article/Chapter (Book) / Electronic Resource
-
Title:Recertification: A Technique to Improve Services in PKI
-
Contributors:
-
Published in:Research Directions in Data and Applications Security , 7 ; 259-270IFIP — The International Federation for Information Processing ; 128, 7 ; 259-270
-
Publisher:
- New search for: Springer US
-
Place of publication:Boston, MA
-
Publication date:2003-01-01
-
Size:12 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Shielding RBAC Infrastructures from CyberterrorismBelokosztolszki, András / Eyers, David et al. | 2003
- 15
-
Privilege Administration for the Role Graph ModelIonita, Cecilia / Osborn, Sylvia et al. | 2003
- 27
-
Implementing RBAC PoliciesBarker, Steve / Douglas, Paul / Fanning, Terry et al. | 2003
- 37
-
Role Delegation for a Resource-Based Security ModelLiebrand, M. / Ellis, H. / Phillips, C. / Demurjian, S. / Ting, T. C. / Ellis, J. et al. | 2003
- 49
-
Using X.509 Attribute Certificates for Role-Based EAMShin, Dongwan / Ahn, Gail-Joon / Cho, Sangrae et al. | 2003
- 61
-
Implementing Workflow SystemsDreyer, Lucas / Olivier, Martin et al. | 2003
- 75
-
Multiphase Damage Confinement System for DatabasesLiu, Peng / Wang, Ying et al. | 2003
- 89
-
Analyzing Transaction Logs for Effective Damage AssessmentRagothaman, Prahalad / Panda, Brajendra et al. | 2003
- 103
-
Deductive Database SecurityBarker, Steve et al. | 2003
- 117
-
Towards Secure XML FederationsWang, Lingyu / Wijesekera, Duminda / Jajodia, Sushil et al. | 2003
- 133
-
Secure XML ViewsStoica, Andrei / Farkas, Csilla et al. | 2003
- 147
-
Distributed Cooperative Updates of XML DocumentsBertino, Elisa / Ferrari, Elena / Mella, Giovanni et al. | 2003
- 163
-
On Security and Privacy Risks in Association Mining AlgorithmsJohnsten, Tom / Raghavan, Vijay / Hill, Kevin et al. | 2003
- 175
-
Mining Malicious Corruption of Data with Hidden Markov ModelsBarbará, Daniel / Goel, Rajni / Jajodia, Sushil et al. | 2003
- 191
-
A Study of Inference Problems in Distributed DatabasesChang, LiWu / Moskowitz, Ira et al. | 2003
- 207
-
Uniform Indexing for Geospatial Data and AuthorizationsAtluri, Vijayalakshmi / Mazzoleni, Pietro et al. | 2003
- 219
-
Access Control of SVG DocumentsDamiani, E. / Capitani di Vimercati, S. / Fernández-Medina, E. / Samarati, P. et al. | 2003
- 233
-
On Modeling Computer Networks for Vulnerability AnalysisCampbell, C. / Dawkins, J. / Pollet, B. / Fitch, K. / Hale, J. / Papa, M. et al. | 2003
- 245
-
On-Line Intrusion Protection by Detecting Attacks with DiversityReynolds, J. / Just, J. / Lawson, E. / Clough, L. / Maglich, R. et al. | 2003
- 259
-
Recertification: A Technique to Improve Services in PKIMukkamala, Ravi / Das, Satyam / Halappanavar, Mahantesh et al. | 2003
- 271
-
A Hybrid PKI Model: Application to Secure MediationBiskup, Joachim / Karabulut, Yücel et al. | 2003
- 285
-
Implementation and Verification of Programmable SecurityMagill, Stephen / Skaggs, Bradley / Papa, Mauricio / Hale, John et al. | 2003
- 301
-
A Process Algebraic Approach to Security PoliciesRyan, Peter / Arnesen, Ragni Ryvold et al. | 2003
- 313
-
Anonymous and Secure Multicast SubscriptionRay, Indrajit / Ray, Indrakshi et al. | 2003
- 331
-
Privacy and Civil LibertiesChadwick, D. / Olivier, M. / Samarati, P. / Sharpston, E. / Thuraisingham, B. et al. | 2003
- E1
-
Erratum to: Research Directions in Data and Applications SecurityGudes, Ehud / Shenoi, Sujeet et al. | 2003