Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
β Scribed by et al, J. Zhou
- Publisher
- IOS Press
- Year
- 2005
- Tongue
- English
- Leaves
- 276
- Series
- Frontiers in Artificial Intelligence and Applications
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, in which many organizations are now leveraging it as part of their core infrastructure system for providing and building security in their businesses. Understanding the challenges and requirements of PKI related operations through the sharing of case studies are critical to supporting the continued research and development of PKI technologies and related systems and applications to further progress and innovate for enhancing future development and evolution of PKI in the enterprises. This publication includes topics such as: PKI Operation & Case Study, Non-repudiation, Authorization & Access Control, Authentication & Time-Stamping, Certificate Validation & Revocation, and Cryptographic Applications.
β¦ Table of Contents
Title page......Page 2
Preface......Page 6
Program Committee......Page 7
Contents......Page 10
PKI Operation & Case Study......Page 12
PKI Challenges: An Industry Analysis......Page 14
Directory Based Registration in Public Key Infrastructures......Page 28
On Automatically Detecting Malicious Imposter Emails......Page 44
Non-Repudiation......Page 60
Generic Fair Non-Repudiation Protocols with Transparent Off-Line TTP......Page 62
Efficient Authorization in Delegation Chains with Strong Non-Repudiation......Page 77
No Author-Based Selective Receipt in Certified Email with Tight Trust Requirements......Page 89
Authorization & Access Control......Page 104
A Generic Protocol for Controlling Access to Mobile Services......Page 106
Use of XACML Policies for a Network Access Control Service......Page 122
A Delegation Logic Based Authorization Mechanism for Virtual Organizations......Page 134
Authentication & Time-Stamping......Page 148
An Efficient and Flexible Scheme to Support Biometric-Based and Role-Based Access Control......Page 150
A Study on a Framework of Online Biometric Authentication with Verification of Personal Repository......Page 166
On Universal Composable Security of Time-Stamping Protocols......Page 180
Certificate Validation & Revocation......Page 194
Augmented CRL Scheme......Page 196
Speeding up X.509 Certificate Path Validation......Page 208
A Lightweight Delegated Privileges Revocation Scheme Based on Coding......Page 218
Cryptographic Applications......Page 234
Hiding Data Sources in P2P Networks......Page 236
Efficient Broadcast from Trapdoor Functions......Page 251
A Generic Scheme for Zero-Knowledge Sets......Page 260
Author Index......Page 276
π SIMILAR VOLUMES
This book constitutes the refereed post-conference proceedings of the 6th European Workshop on Public Key Services, Applications and Infrastructures, EuroPKI 2009, held in Pisa, Italy, in September 2009. The 18 revised full papers presented together with an invited speech were carefully reviewed and
This book constitutes the refereed post-conference proceedings of the 6th European Workshop on Public Key Services, Applications and Infrastructures, EuroPKI 2009, held in Pisa, Italy, in September 2009. The 18 revised full papers presented together with an invited speech were carefully reviewed and
<P>This book constitutes the refereed proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography, PKC 2004, held in Singapore in March 2004.</P><P>The 32 revised full papers presented were carefully reviewed and selected from 106 submissions. All current issues i
<P>This book constitutes the refereed proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography, PKC 2004, held in Singapore in March 2004.</P><P>The 32 revised full papers presented were carefully reviewed and selected from 106 submissions. All current issues i
<p>These proceedings contain the papers accepted at the 2007 European PKI Workshop: Theory and Practice (EuroPKI 2007), held in Palma de Mallorca, Spain, during June 28β30, and hosted by the Computer Science Department of the University of Balearic Islands (UIB) with the support of the Balearic Isla