Buch, Englisch, 272 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 441 g
Reihe: Security and Cryptology
Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30- July 1, 2005, Revised Selected Papers
Buch, Englisch, 272 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 441 g
Reihe: Security and Cryptology
ISBN: 978-3-540-28062-0
Verlag: Springer Berlin Heidelberg
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Soziale und ethische Aspekte der EDV
- Mathematik | Informatik EDV | Informatik Informatik Logik, formale Sprachen, Automaten
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Datenkompression, Dokumentaustauschformate
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Programmierung: Methoden und Allgemeines
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
Weitere Infos & Material
Authorisation.- A Multipurpose Delegation Proxy for WWW Credentials.- Secure Role Activation and Authorization in the Enterprise Environment.- Towards a Unified Authentication and Authorization Infrastructure for Grid Services: Implementing an Enhanced OCSP Service Provider into GT4.- Interoperability.- A Heterogeneous Network Access Service Based on PERMIS and SAML.- Interoperation Between a Conventional PKI and an ID-Based Infrastructure.- XKMS Working Group Interoperability Status Report.- Evaluating a CA.- An Innovative Policy-Based Cross Certification Methodology for Public Key Infrastructures.- Modeling Public Key Infrastructures in the Real World.- Classifying Public Key Certificates.- ID Based Ring Signatures.- Identity Based Ring Signature: Why, How and What Next.- Practical Implementations.- Development of a Flexible PERMIS Authorisation Module for Shibboleth and Apache Server.- CA-in-a-Box.- New Protocols.- A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange.- Recoverable and Untraceable E-Cash.- Risks and Attacks.- A Method for Detecting the Exposure of OCSP Responder’s Session Private Key in D-OCSP-KIS.- Installing Fake Root Keys in a PC.- Long Term Archiving.- Provision of Long-Term Archiving Service for Digitally Signed Documents Using an Archive Interaction Protocol.- Legal Security for Transformations of Signed Documents: Fundamental Concepts.