Sciweavers

112 search results - page 15 / 23
» Generalized Certificate Revocation
Sort
View
IDTRUST
2009
ACM
14 years 4 months ago
Personal identity verification (PIV) cards as federated identities: challenges and opportunities
In this paper, we describe the challenges in using Personal Identity Verification (PIV) cards and PIV-like cards as federated identities to authenticate to US Federal government f...
Sarbari Gupta
APSEC
2004
IEEE
14 years 1 months ago
Monitored Software Components - A Novel Software Engineering Approach
We propose monitoring of software components, and use of monitored software components, as a general approach for engineering of embedded computer systems. In our approach, a comp...
Daniel Sundmark, Anders Möller, Mikael Nolin
COMCOM
2000
79views more  COMCOM 2000»
13 years 9 months ago
Jikzi - a new framework for security policy, trusted publishing and electronic commerce
In this paper, we describe a thread of research which we have followed off and on at Cambridge for about three years. Our topic is the security of electronic documents, in the bro...
Ross J. Anderson, Jong-Hyeon Lee
WWW
2003
ACM
14 years 10 months ago
Content extraction signatures using XML digital signatures and custom transforms on-demand
Content Extraction Signatures (CES) enable selective disclosure of verifiable content, provide privacy for blinded content, and enable the signer to specify the content the docume...
David Squire, Laurence Bull, Peter Stañski
SACMAT
2003
ACM
14 years 3 months ago
PBDM: a flexible delegation model in RBAC
Role-based access control (RBAC) is recognized as an efficient access control model for large organizations. Most organizations have some business rules related to access control...
Xinwen Zhang, Sejong Oh, Ravi S. Sandhu