𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005

✍ Scribed by et al, J. Zhou


Publisher
IOS Press
Year
2005
Tongue
English
Leaves
276
Series
Frontiers in Artificial Intelligence and Applications
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, in which many organizations are now leveraging it as part of their core infrastructure system for providing and building security in their businesses. Understanding the challenges and requirements of PKI related operations through the sharing of case studies are critical to supporting the continued research and development of PKI technologies and related systems and applications to further progress and innovate for enhancing future development and evolution of PKI in the enterprises. This publication includes topics such as: PKI Operation & Case Study, Non-repudiation, Authorization & Access Control, Authentication & Time-Stamping, Certificate Validation & Revocation, and Cryptographic Applications.

✦ Table of Contents


Title page......Page 2
Preface......Page 6
Program Committee......Page 7
Contents......Page 10
PKI Operation & Case Study......Page 12
PKI Challenges: An Industry Analysis......Page 14
Directory Based Registration in Public Key Infrastructures......Page 28
On Automatically Detecting Malicious Imposter Emails......Page 44
Non-Repudiation......Page 60
Generic Fair Non-Repudiation Protocols with Transparent Off-Line TTP......Page 62
Efficient Authorization in Delegation Chains with Strong Non-Repudiation......Page 77
No Author-Based Selective Receipt in Certified Email with Tight Trust Requirements......Page 89
Authorization & Access Control......Page 104
A Generic Protocol for Controlling Access to Mobile Services......Page 106
Use of XACML Policies for a Network Access Control Service......Page 122
A Delegation Logic Based Authorization Mechanism for Virtual Organizations......Page 134
Authentication & Time-Stamping......Page 148
An Efficient and Flexible Scheme to Support Biometric-Based and Role-Based Access Control......Page 150
A Study on a Framework of Online Biometric Authentication with Verification of Personal Repository......Page 166
On Universal Composable Security of Time-Stamping Protocols......Page 180
Certificate Validation & Revocation......Page 194
Augmented CRL Scheme......Page 196
Speeding up X.509 Certificate Path Validation......Page 208
A Lightweight Delegated Privileges Revocation Scheme Based on Coding......Page 218
Cryptographic Applications......Page 234
Hiding Data Sources in P2P Networks......Page 236
Efficient Broadcast from Trapdoor Functions......Page 251
A Generic Scheme for Zero-Knowledge Sets......Page 260
Author Index......Page 276


πŸ“œ SIMILAR VOLUMES


Public Key Infrastructures, Services and
✍ Alexander W. Dent (auth.), Fabio Martinelli, Bart Preneel (eds.) πŸ“‚ Library πŸ“… 2010 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

This book constitutes the refereed post-conference proceedings of the 6th European Workshop on Public Key Services, Applications and Infrastructures, EuroPKI 2009, held in Pisa, Italy, in September 2009. The 18 revised full papers presented together with an invited speech were carefully reviewed and

Public Key Infrastructures, Services and
✍ Alexander W. Dent (auth.), Fabio Martinelli, Bart Preneel (eds.) πŸ“‚ Library πŸ“… 2010 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

This book constitutes the refereed post-conference proceedings of the 6th European Workshop on Public Key Services, Applications and Infrastructures, EuroPKI 2009, held in Pisa, Italy, in September 2009. The 18 revised full papers presented together with an invited speech were carefully reviewed and

Public Key Cryptography – PKC 2004: 7th
✍ Johannes BlΓΆmer, Alexander May (auth.), Feng Bao, Robert Deng, Jianying Zhou (ed πŸ“‚ Library πŸ“… 2004 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<P>This book constitutes the refereed proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography, PKC 2004, held in Singapore in March 2004.</P><P>The 32 revised full papers presented were carefully reviewed and selected from 106 submissions. All current issues i

Public Key Cryptography – PKC 2004: 7th
✍ Johannes BlΓΆmer, Alexander May (auth.), Feng Bao, Robert Deng, Jianying Zhou (ed πŸ“‚ Library πŸ“… 2004 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<P>This book constitutes the refereed proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography, PKC 2004, held in Singapore in March 2004.</P><P>The 32 revised full papers presented were carefully reviewed and selected from 106 submissions. All current issues i

Public Key Infrastructure: 4th European
✍ Ulrich Flegel, Michael Meier (auth.), Javier Lopez, Pierangela Samarati, Josep L πŸ“‚ Library πŸ“… 2007 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>These proceedings contain the papers accepted at the 2007 European PKI Workshop: Theory and Practice (EuroPKI 2007), held in Palma de Mallorca, Spain, during June 28–30, and hosted by the Computer Science Department of the University of Balearic Islands (UIB) with the support of the Balearic Isla