Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005

Free Download

Authors:

Series: Frontiers in Artificial Intelligence and Applications

ISBN: 9781586035501, 1-58603-550-9

Size: 3 MB (3524906 bytes)

Pages: 276/276

File format:

Language:

Publishing Year:

Category:

et al, J. Zhou9781586035501, 1-58603-550-9

Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, in which many organizations are now leveraging it as part of their core infrastructure system for providing and building security in their businesses. Understanding the challenges and requirements of PKI related operations through the sharing of case studies are critical to supporting the continued research and development of PKI technologies and related systems and applications to further progress and innovate for enhancing future development and evolution of PKI in the enterprises. This publication includes topics such as: PKI Operation & Case Study, Non-repudiation, Authorization & Access Control, Authentication & Time-Stamping, Certificate Validation & Revocation, and Cryptographic Applications.

Table of contents :
Title page……Page 2
Preface……Page 6
Program Committee……Page 7
Contents……Page 10
PKI Operation & Case Study……Page 12
PKI Challenges: An Industry Analysis……Page 14
Directory Based Registration in Public Key Infrastructures……Page 28
On Automatically Detecting Malicious Imposter Emails……Page 44
Non-Repudiation……Page 60
Generic Fair Non-Repudiation Protocols with Transparent Off-Line TTP……Page 62
Efficient Authorization in Delegation Chains with Strong Non-Repudiation……Page 77
No Author-Based Selective Receipt in Certified Email with Tight Trust Requirements……Page 89
Authorization & Access Control……Page 104
A Generic Protocol for Controlling Access to Mobile Services……Page 106
Use of XACML Policies for a Network Access Control Service……Page 122
A Delegation Logic Based Authorization Mechanism for Virtual Organizations……Page 134
Authentication & Time-Stamping……Page 148
An Efficient and Flexible Scheme to Support Biometric-Based and Role-Based Access Control……Page 150
A Study on a Framework of Online Biometric Authentication with Verification of Personal Repository……Page 166
On Universal Composable Security of Time-Stamping Protocols……Page 180
Certificate Validation & Revocation……Page 194
Augmented CRL Scheme……Page 196
Speeding up X.509 Certificate Path Validation……Page 208
A Lightweight Delegated Privileges Revocation Scheme Based on Coding……Page 218
Cryptographic Applications……Page 234
Hiding Data Sources in P2P Networks……Page 236
Efficient Broadcast from Trapdoor Functions……Page 251
A Generic Scheme for Zero-Knowledge Sets……Page 260
Author Index……Page 276

Reviews

There are no reviews yet.

Be the first to review “Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005”
Shopping Cart
Scroll to Top