Applied Public Key Infrastructure :4th International Workshop: IWAP 2005 ( Frontiers in Artificial Intelligence and Applications )

Publication subTitle :4th International Workshop: IWAP 2005

Publication series : Frontiers in Artificial Intelligence and Applications

Author: Zhou J.;Kang M.-C.;Bao F.  

Publisher: Ios Press‎

Publication year: 2005

E-ISBN: 9781607501367

P-ISBN(Paperback): 9781586035501

Subject: TP Automation Technology , Computer Technology

Keyword: 自动化技术、计算机技术

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, in which many organizations are now leveraging it as part of their core infrastructure system for providing and building security in their businesses. Understanding the challenges and requirements of PKI related operations through the sharing of case studies are critical to supporting the continued research and development of PKI technologies and related systems and applications to further progress and innovate for enhancing future development and evolution of PKI in the enterprises. This publication includes topics such as: PKI Operation & Case Study; Non-repudiation; Authorization & Access Control, Authentication & Time-Stamping, Certificate Validation & Revocation and Cryptographic Applications.

Chapter

On Automatically Detecting Malicious Imposter Emails

Non-Repudiation

Generic Fair Non-Repudiation Protocols with Transparent Off-Line TTP

Efficient Authorization in Delegation Chains with Strong Non-Repudiation

No Author-Based Selective Receipt in Certified Email with Tight Trust Requirements

Authorization & Access Control

A Generic Protocol for Controlling Access to Mobile Services

Use of XACML Policies for a Network Access Control Service

A Delegation Logic Based Authorization Mechanism for Virtual Organizations

Authentication & Time-Stamping

An Efficient and Flexible Scheme to Support Biometric-Based and Role-Based Access Control

A Study on a Framework of Online Biometric Authentication with Verification of Personal Repository

On Universal Composable Security of Time-Stamping Protocols

Certificate Validation & Revocation

Augmented CRL Scheme

Speeding up X.509 Certificate Path Validation

A Lightweight Delegated Privileges Revocation Scheme Based on Coding

Cryptographic Applications

Hiding Data Sources in P2P Networks

Efficient Broadcast from Trapdoor Functions

A Generic Scheme for Zero-Knowledge Sets

Author Index

The users who browse this book also browse